2021
DOI: 10.48550/arxiv.2103.03939
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

NF-GNN: Network Flow Graph Neural Networks for Malware Detection and Classification

Julian Busch,
Anton Kocheturov,
Volker Tresp
et al.

Abstract: Malicious software (malware) poses an increasing threat to the security of communication systems as the number of interconnected mobile devices increases exponentially. While some existing malware detection and classification approaches successfully leverage network traffic data, they treat network flows between pairs of endpoints independently and thus fail to leverage rich communication patterns present in the complete network. Our approach first extracts flow graphs and subsequently classifies them using a … Show more

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 24 publications
0
2
0
Order By: Relevance
“…In this context, some works have explored the representation of traffic into clusters [22] or graphs [23,24]. Likewise, some recent works such as [25,26] propose the use of graph-based deep learning to exploit the relationship among network connections, showing significant improvement for malware detection in mobile applications. Similarly, [27] approaches the problem of Botnet detection assuming visibility of the full botnet topology.…”
Section: Related Workmentioning
confidence: 99%
“…In this context, some works have explored the representation of traffic into clusters [22] or graphs [23,24]. Likewise, some recent works such as [25,26] propose the use of graph-based deep learning to exploit the relationship among network connections, showing significant improvement for malware detection in mobile applications. Similarly, [27] approaches the problem of Botnet detection assuming visibility of the full botnet topology.…”
Section: Related Workmentioning
confidence: 99%
“…As a result, few recent works have explored the aggregation of network traffic into clusters (e.g., [21]) or graphs. In particular, [22,23] propose the use of graph learning to exploit the relationship among network connections, showing significant improvement for malware detection in mobile applications. Similarly, [24] approaches the problem of Botnet detection assuming visibility of the full botnet topology.…”
Section: Related Workmentioning
confidence: 99%