Trojan Virus Detection and Classification Based on Graph Convolutional Neural Network Algorithm

Authors

  • Wenkun Ren Illinois Institute of Technology
  • Xingpeng Xiao Shandong University of Science and Technology
  • Jian Xu University of Southern California
  • Heyao Chen Beijing University of Posts and Telecommunications
  • Yaomin Zhang University of San Francisco
  • Junyi Zhang Lawrence Technological University

DOI:

https://doi.org/10.70393/6a69656173.323735

ARK:

https://n2t.net/ark:/40704/JIEAS.v3n2a01

Disciplines:

Computer Science

Subjects:

Cybersecurity

References:

16

Keywords:

Trojan Virus, Graph Convolutional Neural Network, Virus Detection and Classification

Abstract

This article proposes a new method for Trojan virus detection and classification based on graph convolutional neural network (GCN) algorithm. By observing the performance evaluation indicators of the model during the training process, the accuracy of the model continued to improve from the initial 64.27% to 88.28% and gradually stabilized, proving that the model can effectively identify Trojan viruses during the training process. In addition, confusion matrix analysis based on the training set shows that the model performs quite well in classification tasks, with an overall accuracy of 91.06%, precision of 89.24, recall of 92.63, and F1 score of 90.91. These indicators indicate that the model can demonstrate good performance in detecting Trojan viruses from various perspectives. On the test set, the model also demonstrated excellent performance, with an accuracy rate of 90.96%, an accuracy rate of 90%, a recall rate of 91.43%, and an F1 score of 90.71. By analyzing the confusion matrix of the test dataset, it can be seen that the classification performance of the model in practical applications is similar to that on the training set, further verifying its good generalization ability. In summary, the experimental results in this article demonstrate that the Trojan virus detection method based on graph convolutional neural networks has high accuracy and stability, and demonstrates superior performance compared to traditional detection methods. This method provides new ideas and technical support for Trojan virus detection in the field of network security, which can effectively respond to increasingly complex network security threats and provide theoretical basis and practical guidance for related research and applications. Through further optimization and improvement, the method proposed in this article is expected to play a greater role in future Trojan virus detection, helping to enhance the level of network security protection.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

Author Biographies

Wenkun Ren, Illinois Institute of Technology

Information Technology and Management, Illinois Institute of Technology, Chicago, USA.

Xingpeng Xiao, Shandong University of Science and Technology

Computer Application Technology, Shandong University of Science and Technology, Qingdao, China.

Jian Xu, University of Southern California

Electrical and Electronics Engineering, University of Southern California, Angeles, USA.

Heyao Chen, Beijing University of Posts and Telecommunications

Computer Science and Technology, Beijing University of Posts and Telecommunications, Beijing, China.

Yaomin Zhang, University of San Francisco

Computer Science, University of San Francisco, San Francisco, USA.

Junyi Zhang, Lawrence Technological University

Electrical and Computer Engineering, Lawrence Technological University, Houston, USA.

References

[1] Chen, H., Shen, Z., Wang, Y. and Xu, J., 2024. Threat Detection Driven by Artificial Intelligence: Enhancing Cybersecurity with Machine Learning Algorithms.

[2] Ullah, S., Ahmad, T., Buriro, A., Zara, N., & Saha, S. (2022). TrojanDetector: a multi-layer hybrid approach for trojan detection in android applications. Applied Sciences, 12(21), 10755.

[3] Liang, X., & Chen, H. (2019, July). A SDN-Based Hierarchical Authentication Mechanism for IPv6 Address. In 2019 IEEE International Conference on Intelligence and Security Informatics (ISI) (pp. 225-225). IEEE.

[4] Nenov, L., Kassev, K., & Chanev, D. (2021, September). Investigation of algorithms for virus detection using neural networks and machine learning. In 2021 Sixth Junior Conference on Lighting (Lighting) (pp. 1-4). IEEE.

[5] Liang, X., & Chen, H. (2019, August). HDSO: A High-Performance Dynamic Service Orchestration Algorithm in Hybrid NFV Networks. In 2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS) (pp. 782-787). IEEE.

[6] Riadi, I., & Aprilliansyah, D. (2023). Analysis of Anubis Trojan Attack on Android Banking Application Using Mobile Security Labware. International Journal of Safety & Security Engineering, 13(1).

[7] Chen, H., & Bian, J. (2019, February). Streaming media live broadcast system based on MSE. In Journal of Physics: Conference Series (Vol. 1168, No. 3, p. 032071). IOP Publishing.

[8] Kanaker, H., Karim, N. A., Awwad, S. A., Ismail, N. H., & Zraqou, J. (2022). Trojan Horse Infection Detection in Cloud Based Environment Using Machine Learning. International Journal of Interactive Mobile Technologies, 16(24).

[9] Ke, Z., & Yin, Y. (2024). Tail Risk Alert Based on Conditional Autoregressive VaR by Regression Quantiles and Machine Learning Algorithms. arXiv preprint arXiv:2412.06193

[10] Zanluqui, N. G., Oliveira, L. G., Polonio, C. M., França, T. T., De Souza, G. P., Muraro, S. P., ... & Peron, J. P. S. (2021). Zika Virus Infection of Murine and Human Neutrophils and Their Function as Trojan Horses to the Placenta. BioRxiv, 2021-09.

[11] Ke, Z., Xu, J., Zhang, Z., Cheng, Y., & Wu, W. (2024). A Consolidated Volatility Prediction with Back Propagation Neural Network and Genetic Algorithm. arXiv preprint arXiv:2412.07223

[12] Yu, Q., Xu, Z., & Ke, Z. (2024). Deep Learning for Cross-Border Transaction Anomaly Detection in Anti-Money Laundering Systems. arXiv preprint arXiv:2412.07027.

[13] Hendrawan, A. H., Kurniawan, R., Aprian, A. J., Primasari, D., & Subchan, M. (2024). Enhancing Cybersecurity Through Live Forensic Investigation of Remote Access Trojan Attacks using FTK Imager Software. International Journal of Safety & Security Engineering, 14(1).

[14] Hu, Z., Lei, F., Fan, Y., Ke, Z., Shi, G., & Li, Z. (2024). Research on Financial Multi-Asset Portfolio Risk Prediction Model Based on Convolutional Neural Networks and Image Processing. arXiv preprint arXiv:2412.03618.

[15] Xu, J., Chen, H., Xiao, X., Zhao, M., Liu, B. (2025). Gesture Object Detection and Recognition Based on YOLOv11.Applied and Computational Engineering,133,81-89.

[16] Chiwariro, R., & Pullagura, L. (2023). Malware detection and classification using machine learning algorithms. Int J Res Appl Sci Eng Technol, 11(8), 1727-1738.

Downloads

Published

2025-04-01

How to Cite

[1]
W. Ren, X. Xiao, J. Xu, H. Chen, Y. Zhang, and J. Zhang, “Trojan Virus Detection and Classification Based on Graph Convolutional Neural Network Algorithm”, Journal of Industrial Engineering & Applied Science, vol. 3, no. 2, pp. 1–5, Apr. 2025.

Issue

Section

Articles

ARK