2021
DOI: 10.3390/electronics10202534
|View full text |Cite
|
Sign up to set email alerts
|

Malware Detection Based on Graph Attention Networks for Intelligent Transportation Systems

Abstract: Intelligent Transportation Systems (ITS) aim to make transportation smarter, safer, reliable, and environmentally friendly without detrimentally affecting the service quality. ITS can face security issues due to their complex, dynamic, and non-linear properties. One of the most critical security problems is attacks that damage the infrastructure of the entire ITS. Attackers can inject malware code that triggers dangerous actions such as information theft and unwanted system moves. The main objective of this st… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 17 publications
(6 citation statements)
references
References 36 publications
0
6
0
Order By: Relevance
“…Daniel Arp used extensive static analysis to embed features in a joint vector space and used the machine learning method SVM. Cagatay Catal [ 38 ]used an application programming interface (API) call graph obtained from malware and benign Android apk files to solve the Android malware detection problem using a graph attention network model. Han Gao [ 39 ] proposed a new method for detecting Android malware based on the graph convolutional neural network model.…”
Section: Resultsmentioning
confidence: 99%
“…Daniel Arp used extensive static analysis to embed features in a joint vector space and used the machine learning method SVM. Cagatay Catal [ 38 ]used an application programming interface (API) call graph obtained from malware and benign Android apk files to solve the Android malware detection problem using a graph attention network model. Han Gao [ 39 ] proposed a new method for detecting Android malware based on the graph convolutional neural network model.…”
Section: Resultsmentioning
confidence: 99%
“…In the study [41], the node embeddings of an API call graph are computed using node2vec and aggregated with a GAT model. The authors explain that the use of node2vec as feature extraction method is justified by a 3% increase in F-score compared to traditional graph centrality features.…”
Section: Fcg Approachesmentioning
confidence: 99%
“…Further, Ref. [47] showcased the integration of GANs with various node attributes, illustrating how GANs can outperform traditional detection models. The deployment of GANs in the realm of malware detection holds significant promise in managing the increasing complexity of malware challenges and bolstering the ability of detection models to adapt to new malware types, ultimately aiding in the development of more resilient and effective malware detection frameworks.…”
Section: Introductionmentioning
confidence: 99%