NF-GNN: Network Flow Graph Neural Networks for Malware Detection and Classification

03/05/2021
by   Julian Busch, et al.
0

Malicious software (malware) poses an increasing threat to the security of communication systems, as the number of interconnected mobile devices increases exponentially. While some existing malware detection and classification approaches successfully leverage network traffic data, they treat network flows between pairs of endpoints independently and thus fail to leverage the rich structural dependencies in the complete network. Our approach first extracts flow graphs and subsequently classifies them using a novel graph neural network model. We present three variants of our base model, which all support malware detection and classification in supervised and unsupervised settings. We evaluate our approach on flow graphs that we extract from a recently published dataset for mobile malware detection that addresses several issues with previously available datasets. Experiments on four different prediction tasks consistently demonstrate the advantages of our approach and show that our graph neural network model can boost detection performance by a significant margin.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/22/2023

A Comparison of Graph Neural Networks for Malware Classification

Managing the threat posed by malware requires accurate detection and cla...
research
01/19/2022

Graph Neural Network-based Android Malware Classification with Jumping Knowledge

This paper presents a new Android malware detection method based on Grap...
research
08/10/2022

Sequence Feature Extraction for Malware Family Analysis via Graph Neural Network

Malicious software (malware) causes much harm to our devices and life. W...
research
06/01/2023

Interpreting GNN-based IDS Detections Using Provenance Graph Structural Features

The black-box nature of complex Neural Network (NN)-based models has hin...
research
12/10/2018

Deep Program Reidentification: A Graph Neural Network Solution

Program or process is an integral part of almost every IT/OT system. Can...
research
05/24/2023

Foundational Models for Malware Embeddings Using Spatio-Temporal Parallel Convolutional Networks

In today's interconnected digital landscape, the proliferation of malwar...
research
12/07/2022

RADAR: Effective Network-based Malware Detection based on the MITRE ATT CK Framework

MITRE ATT CK is a widespread ontology that specifies tactics, techniqu...

Please sign up or login with your details

Forgot password? Click here to reset