2022
DOI: 10.1002/int.22880
|View full text |Cite
|
Sign up to set email alerts
|

Malware detection with dynamic evolving graph convolutional networks

Abstract: Malware detection is a vital task for cybersecurity. For malware dynamic behavior, threats come from a small number of Application Programming Interfaces (APIs) embedded in the API sequences, which are easily ignored or obfuscated in the detection process.Prior works proposed graph-based learning methods to solve this problem using API-level behavior relations.However, the malware detection is still challenging, due to the ignore of the temporal correlation between malicious behaviors. In this study, we model … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 45 publications
0
5
0
Order By: Relevance
“…The attacker normally creates a powerful botnet by taking advantage of flaws in networked devices, which disrupts a targeted internet service supplier and results in significant service unavailability. Organizations and enterprises incur substantial financial costs as a result of these attacks due to the disruptions in operations and the expenses associated with the analysis and resolution of cyber events [14].…”
Section: Iot Attack-related Tangible Damagementioning
confidence: 99%
See 1 more Smart Citation
“…The attacker normally creates a powerful botnet by taking advantage of flaws in networked devices, which disrupts a targeted internet service supplier and results in significant service unavailability. Organizations and enterprises incur substantial financial costs as a result of these attacks due to the disruptions in operations and the expenses associated with the analysis and resolution of cyber events [14].…”
Section: Iot Attack-related Tangible Damagementioning
confidence: 99%
“…Most existing studies on malware detection have focused on static or dynamic analysis, machine learning, or ensemble techniques, with some exploring hybrid analysis and big data approaches [13][14][15][16][17]. AI-based malware detection is gaining attention, particularly through ensemble learning, which exhibits promise by training multiple classifiers.…”
Section: Motivation and Contributionsmentioning
confidence: 99%
“…This method can be viewed as a hybrid model of macro and micro-feature detection. Changes in edge features could reflect anomalies at connected nodes, even if the algorithm doesn't explicitly analyze node properties.Zikai Zhang et al [41] proposes a Dynamic Evolving Graph Convolutional Network(DEGCN) model to capture patterns evolving with time of both node-level and graph-level behavior. This correlates to combining both macro and micro-level feature detection.…”
Section: Subgraph Level Anomaly Detectionmentioning
confidence: 99%
“…Anomalous nodes → modeling stochasticity and multi-scale ST dependency GCN and GRU DEGCN [50] To capture node-and global-level patterns → DGCN and GGRU GCN alone TDG with GCN [51] Malicious connections on traffic → extracting TDGs graph. It used the GCN encoder and the deconvolutional decoder.…”
Section: Gcn and Drnn-based Gae H-vgrae [49]mentioning
confidence: 99%
“…Zhang et al [50] proposed a novel dynamic evolving graph convolutional network (DEGCN) model to capture evolving patterns of both local node-level and global graph-level software behaviors. It consists of three stages.…”
Section: ) Anomalous Node Detectionmentioning
confidence: 99%