2023
DOI: 10.48550/arxiv.2303.16004
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

A Survey on Malware Detection with Graph Representation Learning

Abstract: Malware detection has become a major concern due to the increasing number and complexity of malware. Traditional detection methods based on signatures and heuristics are used for malware detection, but unfortunately, they suffer from poor generalization to unknown attacks and can be easily circumvented using obfuscation techniques. In recent years, Machine Learning (ML) and notably Deep Learning (DL) achieved impressive results in malware detection by learning useful representations from data and have become a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 132 publications
(197 reference statements)
0
2
0
Order By: Relevance
“…Their concentration was on the detection techniques and detection frameworks. Bilot et al [14] conducted a survey on malware detection based on graph representation learning. They mainly summarized the graph-based deep learning for malware detection and adversarial attacks.…”
Section: Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Their concentration was on the detection techniques and detection frameworks. Bilot et al [14] conducted a survey on malware detection based on graph representation learning. They mainly summarized the graph-based deep learning for malware detection and adversarial attacks.…”
Section: Workmentioning
confidence: 99%
“…Formulae) The efficiency of an ML technique is usually measured using different metrics, as shown in Eqs. ( 5)− (14). A careful understanding of the metrics, the algorithms, and the data size, type and variety is key in selecting a metric for the evaluation of learning models.…”
Section: Performance Evaluation Of ML Models (Metrics Andmentioning
confidence: 99%
“…One of the samples within each family has its corresponding provenance graph available in [61]. For the second sample in each family, we utilized a dynamic malware analysis platform 7 to analyze the actions performed by the sample on the system and generate the corresponding provenance graphs. We proceeded by testing whether the subgraph relationship between the pairs of isolated provenance graphs is preserved.…”
Section: F Robustness Comparisonmentioning
confidence: 99%
“…https://en.wikipedia.org/wiki/Subgraph_isomorphism_problem 2 In the cybersecurity context, graph representation learning has already demonstrated notable advancements and widespread application, particularly in the domain of vulnerability detection[7,13].…”
mentioning
confidence: 99%