Trojan Virus Detection and Classification Based on Graph Convolutional Neural Network Algorithm
DOI:
https://doi.org/10.70393/6a69656173.323735ARK:
https://n2t.net/ark:/40704/JIEAS.v3n2a01Disciplines:
Computer ScienceSubjects:
CybersecurityReferences:
16Keywords:
Trojan Virus, Graph Convolutional Neural Network, Virus Detection and ClassificationAbstract
This article proposes a new method for Trojan virus detection and classification based on graph convolutional neural network (GCN) algorithm. By observing the performance evaluation indicators of the model during the training process, the accuracy of the model continued to improve from the initial 64.27% to 88.28% and gradually stabilized, proving that the model can effectively identify Trojan viruses during the training process. In addition, confusion matrix analysis based on the training set shows that the model performs quite well in classification tasks, with an overall accuracy of 91.06%, precision of 89.24, recall of 92.63, and F1 score of 90.91. These indicators indicate that the model can demonstrate good performance in detecting Trojan viruses from various perspectives. On the test set, the model also demonstrated excellent performance, with an accuracy rate of 90.96%, an accuracy rate of 90%, a recall rate of 91.43%, and an F1 score of 90.71. By analyzing the confusion matrix of the test dataset, it can be seen that the classification performance of the model in practical applications is similar to that on the training set, further verifying its good generalization ability. In summary, the experimental results in this article demonstrate that the Trojan virus detection method based on graph convolutional neural networks has high accuracy and stability, and demonstrates superior performance compared to traditional detection methods. This method provides new ideas and technical support for Trojan virus detection in the field of network security, which can effectively respond to increasingly complex network security threats and provide theoretical basis and practical guidance for related research and applications. Through further optimization and improvement, the method proposed in this article is expected to play a greater role in future Trojan virus detection, helping to enhance the level of network security protection.
Downloads
Metrics
References
[1] Chen, H., Shen, Z., Wang, Y. and Xu, J., 2024. Threat Detection Driven by Artificial Intelligence: Enhancing Cybersecurity with Machine Learning Algorithms.
[2] Ullah, S., Ahmad, T., Buriro, A., Zara, N., & Saha, S. (2022). TrojanDetector: a multi-layer hybrid approach for trojan detection in android applications. Applied Sciences, 12(21), 10755.
[3] Liang, X., & Chen, H. (2019, July). A SDN-Based Hierarchical Authentication Mechanism for IPv6 Address. In 2019 IEEE International Conference on Intelligence and Security Informatics (ISI) (pp. 225-225). IEEE.
[4] Nenov, L., Kassev, K., & Chanev, D. (2021, September). Investigation of algorithms for virus detection using neural networks and machine learning. In 2021 Sixth Junior Conference on Lighting (Lighting) (pp. 1-4). IEEE.
[5] Liang, X., & Chen, H. (2019, August). HDSO: A High-Performance Dynamic Service Orchestration Algorithm in Hybrid NFV Networks. In 2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS) (pp. 782-787). IEEE.
[6] Riadi, I., & Aprilliansyah, D. (2023). Analysis of Anubis Trojan Attack on Android Banking Application Using Mobile Security Labware. International Journal of Safety & Security Engineering, 13(1).
[7] Chen, H., & Bian, J. (2019, February). Streaming media live broadcast system based on MSE. In Journal of Physics: Conference Series (Vol. 1168, No. 3, p. 032071). IOP Publishing.
[8] Kanaker, H., Karim, N. A., Awwad, S. A., Ismail, N. H., & Zraqou, J. (2022). Trojan Horse Infection Detection in Cloud Based Environment Using Machine Learning. International Journal of Interactive Mobile Technologies, 16(24).
[9] Ke, Z., & Yin, Y. (2024). Tail Risk Alert Based on Conditional Autoregressive VaR by Regression Quantiles and Machine Learning Algorithms. arXiv preprint arXiv:2412.06193
[10] Zanluqui, N. G., Oliveira, L. G., Polonio, C. M., França, T. T., De Souza, G. P., Muraro, S. P., ... & Peron, J. P. S. (2021). Zika Virus Infection of Murine and Human Neutrophils and Their Function as Trojan Horses to the Placenta. BioRxiv, 2021-09.
[11] Ke, Z., Xu, J., Zhang, Z., Cheng, Y., & Wu, W. (2024). A Consolidated Volatility Prediction with Back Propagation Neural Network and Genetic Algorithm. arXiv preprint arXiv:2412.07223
[12] Yu, Q., Xu, Z., & Ke, Z. (2024). Deep Learning for Cross-Border Transaction Anomaly Detection in Anti-Money Laundering Systems. arXiv preprint arXiv:2412.07027.
[13] Hendrawan, A. H., Kurniawan, R., Aprian, A. J., Primasari, D., & Subchan, M. (2024). Enhancing Cybersecurity Through Live Forensic Investigation of Remote Access Trojan Attacks using FTK Imager Software. International Journal of Safety & Security Engineering, 14(1).
[14] Hu, Z., Lei, F., Fan, Y., Ke, Z., Shi, G., & Li, Z. (2024). Research on Financial Multi-Asset Portfolio Risk Prediction Model Based on Convolutional Neural Networks and Image Processing. arXiv preprint arXiv:2412.03618.
[15] Xu, J., Chen, H., Xiao, X., Zhao, M., Liu, B. (2025). Gesture Object Detection and Recognition Based on YOLOv11.Applied and Computational Engineering,133,81-89.
[16] Chiwariro, R., & Pullagura, L. (2023). Malware detection and classification using machine learning algorithms. Int J Res Appl Sci Eng Technol, 11(8), 1727-1738.

Downloads
Published
How to Cite
Issue
Section
ARK
License
Copyright (c) 2025 The author retains copyright and grants the journal the right of first publication.

This work is licensed under a Creative Commons Attribution 4.0 International License.