33rd International Conference on Scientific and Statistical Database Management 2021
DOI: 10.1145/3468791.3468814
|View full text |Cite
|
Sign up to set email alerts
|

NF-GNN: Network Flow Graph Neural Networks for Malware Detection and Classification

Abstract: Malicious software (malware) poses an increasing threat to the security of communication systems as the number of interconnected mobile devices increases exponentially. While some existing malware detection and classification approaches successfully leverage network traffic data, they treat network flows between pairs of endpoints independently and thus fail to leverage rich communication patterns present in the complete network. Our approach first extracts flow graphs and subsequently classifies them using a … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 40 publications
(13 citation statements)
references
References 27 publications
0
7
0
Order By: Relevance
“…The network activity generated by the program can also be monitored during its execution, and a network flow graph can be constructed with IP addresses and/or communication ports as nodes, and edges representing network flows. While some works solely rely on network traffic to detect malware activities [49,50], others enhance their detection capabilities by combining CFGs or FCGs with network data [32,33].…”
Section: Common Graphmentioning
confidence: 99%
“…The network activity generated by the program can also be monitored during its execution, and a network flow graph can be constructed with IP addresses and/or communication ports as nodes, and edges representing network flows. While some works solely rely on network traffic to detect malware activities [49,50], others enhance their detection capabilities by combining CFGs or FCGs with network data [32,33].…”
Section: Common Graphmentioning
confidence: 99%
“…Opcode-level graphs can also be treated like text features rather than graphical data. For example, in [5] dynamically-generated network flow graphs are used to create a new model that its authors call Network Flow Graph Neural Network (NF-GNN). This NF-GNN model relies on a novel edge feature-based GNN for classification.…”
Section: Graph Learning-based Classificationmentioning
confidence: 99%
“…GNN [17–20, 71, 72] is a practical approach to capturing malware's structural and complicated semantics features. Yan et al.…”
Section: Related Workmentioning
confidence: 99%
“…Busch et al. [72] extracted network flow graphs based on the network traffic data generated during the execution of the apps. They proposed to use GNN and its variants to learn the representations of the network flow graphs.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation