Score: 0

IoT-based Android Malware Detection Using Graph Neural Network With Adversarial Defense

Published: December 23, 2025 | arXiv ID: 2512.20004v1

By: Rahul Yumlembam , Biju Issac , Seibu Mary Jacob and more

Potential Business Impact:

Finds bad apps and makes them harder to trick.

Business Areas:
Intelligent Systems Artificial Intelligence, Data and Analytics, Science and Engineering

Since the Internet of Things (IoT) is widely adopted using Android applications, detecting malicious Android apps is essential. In recent years, Android graph-based deep learning research has proposed many approaches to extract relationships from applications as graphs to generate graph embeddings. First, we demonstrate the effectiveness of graph-based classification using a Graph Neural Network (GNN)-based classifier to generate API graph embeddings. The graph embeddings are combined with Permission and Intent features to train multiple machine learning and deep learning models for Android malware detection. The proposed classification approach achieves an accuracy of 98.33 percent on the CICMaldroid dataset and 98.68 percent on the Drebin dataset. However, graph-based deep learning models are vulnerable, as attackers can add fake relationships to evade detection by the classifier. Second, we propose a Generative Adversarial Network (GAN)-based attack algorithm named VGAE-MalGAN targeting graph-based GNN Android malware classifiers. The VGAE-MalGAN generator produces adversarial malware API graphs, while the VGAE-MalGAN substitute detector attempts to mimic the target detector. Experimental results show that VGAE-MalGAN can significantly reduce the detection rate of GNN-based malware classifiers. Although the model initially fails to detect adversarial malware, retraining with generated adversarial samples improves robustness and helps mitigate adversarial attacks.

Country of Origin
🇬🇧 United Kingdom

Page Count
13 pages

Category
Computer Science:
Cryptography and Security