Abstract
With the significant increase of Android malware, the APP privacy data leakage incidents occur frequently, which poses a great threat to user property and information security. Specifically, the new malware has the characteristics of high evolution rate and diverse variants, leading to the fact that the current malware detection methods still have three key problems: (1) Difficulty in acquiring Android sample structural features; (2) Weakly in representing malware behavior structure; (3) Poor robustness of the detection model. To address the above limitations, we propose a new malware detection framework MPRLDroid with reinforcement learning. First of all, the MPRLDroid model extracts the Android APP structural features and constructs the heterogeneous information network data based on the semantic call structure between APP, API and permission. Subsequently, the model utilizes reinforcement learning to adaptively generate a meta-path for each sample and combines it with a graph attention network to effectively represent the graph of nodes. Finally, the low-dimensional graph node vector data is brought into the downstream detection task for classification, where the performance change of the classification result is used as a reward function for reinforcement learning. The experimental results demonstrate that the MPRLDroid model, when integrated with reinforcement learning, outperforms the baseline models in terms of performance, and its detection model exhibits greater robustness compared to other models.






Similar content being viewed by others
Explore related subjects
Discover the latest articles and news from researchers in related subjects, suggested using machine learning.Data Availability
The data supporting the findings of this study are available from the authors upon request.
References
Statcounter (2023) Mobile operating system market share worldwide. In: https://gs.statcounter.com/os-market-share/mobile/worldwide, pp. 1–2
DAVID C (2023) Android mobile market statistics. In: https://www.Businessofapps.com/data/android-statistics/, pp. 1–2
Isohara T, Takemori K (2011) Kubota A (2011) Kernel-based behavior analysis for android malware detection. In: Wang Y, Cheung Y, Guo P, Wei Y (eds) Seventh International Conference on Computational Intelligence and Security. CIS 2011, Sanya, Hainan, China, December 3–4, pp 1011–1015
Kramer S, Bradfield JC (2010) A general definition of malware. J Comput Virol 6(2):105–114
Kim AC, Kim S, Park WH, Lee DH (2014) Fraud and financial crime detection model using malware forensics. Multim. Tools Appl. 68(2):479–496
Sami A, Yadegari B, Rahimi H, Peiravian N, Hashemi S, Hamzeh A (2010) Malware detection based on mining API calls. In: Shin, S.Y., Ossowski, S., Schumacher, M., Palakal, M.J., Hung, C. (eds.) Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010, pp. 1020–1025
Seraj S, Khodambashi S, Pavlidis M, Polatidis N (2022) Hamdroid: permission-based harmful android anti-malware detection using neural networks. Neural Comput Appl 34(18):15165–15174
Ilham S, Ghadi A, Abdelhakim AB (2018) Permission based malware detection in android devices. In: Proceedings of the 3rd International Conference on Smart City Applications, SCA 2018, Tetouan, Morocco, October 10-11, 2018, pp. 1–6
Uppal D, Sinha R, Mehra V, Jain V (2014) Malware detection and classification based on extraction of API sequences. In: 2014 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2014, Delhi, India, September 24-27, 2014, pp. 2337–2342
Shankarapani MK, Ramamoorthy S, Movva RS, Mukkamala S (2011) Malware detection using assembly and API call sequences. J Comput Virol 7(2):107–119
Pektas A, Acarman T (2020) Deep learning for effective android malware detection using API call graph embeddings. Soft Comput 24(2):1027–1043
Zhou H, Zhang W, Wei F, Chen Y (2017) Analysis of android malware family characteristic based on isomorphism of sensitive API call graph. In: Second IEEE International Conference on Data Science in Cyberspace, DSC 2017, Shenzhen, China, June 26-29, 2017, pp. 319–327
Li C, Cheng Z, Zhu H, Wang L, Lv Q, Wang Y, Li N, Sun D (2022) Dmalnet: Dynamic malware analysis based on API feature engineering and graph learning. Comput Secur 122:102872
Hou S, Ye Y, Song Y, Abdulhayoglu M (2017) Hindroid: An intelligent android malware detection system based on structured heterogeneous information network. In: Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada, August 13 - 17, 2017, pp. 1507–1515
Hei Y, Yang R, Peng H, Wang L, Xu X, Liu J, Liu H, Xu J, Sun L (2021) HAWK: rapid android malware detection through heterogeneous graph attention networks. arXiv:2108.07548
Wang X, Bo D, Shi C, Fan S, Ye Y, Yu PS (2023) A survey on heterogeneous graph embedding: Methods, techniques, applications and sources. IEEE Trans. Big Data 9(2):415–436
Yang CJ, Xiao Y, Zhang Y, Sun Y, Han J (2022) Heterogeneous network representation learning: A unified framework with survey and benchmark. IEEE Trans Knowl Data Eng 34(10):4854–4873
Amin M, Tanveer TA, Tehseen M, Khan M, Khan FA, Anwar S (2020) Static malware detection and attribution in android byte-code through an end-to-end deep system. Future Gener. Comput. Syst. 102:112–126
Jeon S, Moon J (2020) Malware-detection method with a convolutional recurrent neural network using opcode sequences. Inf Sci 535:1–15
Ye Y, Chen L, Wang D, Li T, Jiang Q, Zhao M (2009) SBMDS: an interpretable string based malware detection system using SVM ensemble with bagging. J Comput Virol 5(4):283–293
Arora A, Peddoju SK, Conti M (2020) Permpair: Android malware detection using permission pairs. IEEE Trans Inf Forensics Secur 15:1968–1982
Li J, Sun L, Yan Q, Li Z, Srisa-an W, Ye H (2018) Significant permission identification for machine-learning-based android malware detection. IEEE Trans. Ind. Informatics 14(7):3216–3225
You I, Yim K (2010) Malware obfuscation techniques: A brief survey. In: Proceedings of the Fifth International Conference on Broadband and Wireless Computing, Communication and Applications, BWCCA 2010, November 4-6, 2010, Fukuoka Institute of Technology, Fukuoka, Japan (In Conjunction with the 3PGCIC-2010 International Conference), pp. 297–300
Ki Y, Kim E, Kim HK (2015) A novel approach to detect malware based on API call sequence analysis. Int. J. Distributed Sens. Networks 11:659101–16591019
Gascon H, Yamaguchi F, Arp D, Rieck K (2013) Structural detection of android malware using embedded call graphs. In: Sadeghi, A., Nelson, B., Dimitrakakis, C., Shi, E. (eds.) AISec’13, Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, Co-located with CCS 2013, Berlin, Germany, November 4, 2013, pp. 45–54
Hassen M, Chan PK (2017) Scalable function call graph-based malware classification. In: Ahn, G., Pretschner, A., Ghinita, G. (eds.) Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017, pp. 239–248
Hu X, Chiueh T, Shin KG (2009) Large-scale malware indexing using function-call graphs. In: Al-Shaer, E., Jha, S., Keromytis, A.D. (eds.) Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pp. 611–620
Chen Z, Kang H, Yin S, Kim S (2017) Automatic ransomware detection and analysis based on dynamic API calls flow graph. In: Proceedings of the International Conference on Research in Adaptive and Convergent Systems, RACS 2017, Krakow, Poland, September 20-23, 2017, pp. 196–201
Pektas A, Acarman T (2020) Deep learning for effective android malware detection using API call graph embeddings. Soft Comput 24(2):1027–1043
Bruschi D, Martignoni L, Monga M (2006) Detecting self-mutating malware using control-flow graph matching. In: Büschkes, R., Laskov, P. (eds.) Detection of Intrusions and Malware & Vulnerability Assessment, Third International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006, Proceedings. Lecture Notes in Computer Science, vol. 4064, pp. 129–143
Yan J, Yan G, Jin D (2019) Classifying malware represented as control flow graphs using deep graph convolutional neural network. In: 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2019, Portland, OR, USA, June 24-27, 2019, pp. 52–63
Arulkumaran K, Deisenroth MP, Brundage M, Bharath AA (2017) Deep reinforcement learning: A brief survey. IEEE Signal Process Mag 34(6):26–38
Mousavi SS, Schukat M, Howley E (2018) Deep reinforcement learning: An overview. arXiv:1806.08894
Wu C, Shi J, Yang Y, Li W (2018) Enhancing machine learning based malware detection model by reinforcement learning. In: Proceedings of the 8th International Conference on Communication and Network Security, ICCNS 2018, Qingdao, China, November 02-04, 2018, pp. 74–78
Fang Z, Wang J, Geng J, Kan X (2019) Feature selection for malware detection based on reinforcement learning. IEEE Access 7:176177–176187
Wang Y, Stokes JW, Marinescu M (2020) Actor critic deep reinforcement learning for neural malware control. In: The Thirty-Fourth AAAI Conference on Artificial Intelligence, AAAI 2020, The Thirty-Second Innovative Applications of Artificial Intelligence Conference, IAAI 2020, The Tenth AAAI Symposium on Educational Advances in Artificial Intelligence, EAAI 2020, New York, NY, USA, February 7-12, 2020, pp. 1005–1012
Ebrahimi R, Pacheco J, Hu J, Chen H (2024) Learning contextualized action representations in sequential decision making for adversarial malware optimization. IEEE Transactions on Dependable and Secure Computing
Al-Fawa’reh M, Abu-Khalaf J, Szewczyk P, Kang JJ (2023) Malbot-drl: Malware botnet detection using deep reinforcement learning in iot networks. IEEE Internet of Things Journal
Zhong F, Hu P, Zhang G, Li H, Cheng X (2022) Reinforcement learning based adversarial malware example generation against black-box detectors. Comput Secur 121:102869
Tian B, Jiang J, He Z, Yuan X, Dong L, Sun C (2024) Functionality-verification attack framework based on reinforcement learning against static malware detectors. IEEE Trans Inf Forensics Secur 19:8500–8514
Anderson HS, Kharkar A, Filar B, Evans D, Roth P (2018) Learning to evade static PE machine learning malware models via reinforcement learning. arXiv:1801.08917
Castro RL, Franz S, Rodosek GD (2021) AIMED-RL: exploring adversarial malware examples with reinforcement learning. In: Dong, Y., Kourtellis, N., Hammer, B., Lozano, J.A. (eds.) Machine Learning and Knowledge Discovery in Databases. Applied Data Science Track - European Conference, ECML PKDD 2021, Bilbao, Spain, September 13-17, 2021, Proceedings, Part IV. Lecture Notes in Computer Science, vol. 12978, pp. 37–52
Zhong F, Hu P, Zhang G, Li H, Cheng X (2022) Reinforcement learning based adversarial malware example generation against black-box detectors. Comput Secur 121:102869
Wu Y, Li M, Zeng Q, Yang T, Wang J, Fang Z, Cheng L (2023) Droidrl: Feature selection for android malware detection with reinforcement learning. Comput Secur 128:103126
Zhang L, Liu P, Choi Y, Chen P (2023) Semantics-preserving reinforcement learning attack against graph neural networks for malware detection. IEEE Trans. Dependable Secur. Comput. 20(2):1390–1402
Zapzalka D, Salem S, Mohaisen D (2024) Semantics-preserving node injection attacks against gnn-based acfg malware classifiers. IEEE Transactions on Dependable and Secure Computing
Onwuzurike L, Mariconti E, Andriotis P, Cristofaro ED, Ross GJ, Stringhini G (2019) Mamadroid: Detecting android malware by building markov chains of behavioral models (extended version). ACM Trans. Priv. Secur. 22(2):14–11434
Gong L, Li Z, Qian F, Zhang Z, Chen QA, Qian Z, Lin H (2020) Liu Y (2020) Experiences of landing machine learning onto market-scale mobile malware detection. In: Bilas A, Magoutis K, Markatos EP, Kostic D, Seltzer MI (eds) EuroSys ’20: Fifteenth EuroSys Conference 2020. Heraklion, Greece, April 27–30, pp 2–1214
Xie N, Zeng F, Qin X, Zhang Y, Zhou M (2018) Lv C (2018) Repassdroid: Automatic detection of android malware based on essential permissions and semantic features of sensitive apis. In: Pang J, Zhang C, He J, Weng J (eds) 2018 International Symposium on Theoretical Aspects of Software Engineering. TASE 2018, Guangzhou, China, August 29–31, pp 52–59
Otterlo M, Wiering MA (2012) Reinforcement learning and markov decision processes. In: Wiering, M.A., Otterlo, M. (eds.) Reinforcement Learning. Adaptation, Learning, and Optimization, vol. 12, pp. 3–42
Hasselt H, Guez A, Silver D (2016) Deep reinforcement learning with double q-learning. In: Schuurmans, D., Wellman, M.P. (eds.) Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, February 12-17, 2016, Phoenix, Arizona, USA, pp. 2094–2100
Tang J, Qu M, Wang M, Zhang M, Yan J, Mei Q (2015) LINE: large-scale information network embedding. In: Gangemi, A., Leonardi, S., Panconesi, A. (eds.) Proceedings of the 24th International Conference on World Wide Web, WWW 2015, Florence, Italy, May 18-22, 2015, pp. 1067–1077
Vaswani A, Shazeer N, Parmar N, Uszkoreit J, Jones L, Gomez AN, Kaiser L, Polosukhin I (2017) Attention is all you need. In: Guyon, I., Luxburg, U., Bengio, S., Wallach, H.M., Fergus, R., Vishwanathan, S.V.N., Garnett, R. (eds.) Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, December 4-9, 2017, Long Beach, CA, USA, pp. 5998–6008
Hou Y, Liu L, Wei Q, Xu X, Chen C (2017) A novel DDPG method with prioritized experience replay. In: 2017 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2017, Banff, AB, Canada, October 5-8, 2017, pp. 316–321
Lashkari AH, Kadir AFA, Taheri L, Ghorbani AA (2018) Toward developing a systematic approach to generate benchmark android malware datasets and classification. In: 2018 International Carnahan Conference on Security Technology, ICCST 2018, Montreal, QC, Canada, October 22-25, 2018, pp. 1–7
Imtiaz SI, Rehman S, Javed AR, Jalil Z, Liu X, Alnumay WS (2021) Deepamd: Detection and identification of android malware using high-efficient deep artificial neural network. Future Gener. Comput. Syst. 115:844–856
Taheri L, Kadir AFA (2019) Lashkari AH (2019) Extensible android malware detection and family classification using network-flows and api-calls. In: Thomas GL, John M (eds) 2019 International Carnahan Conference on Security Technology. ICCST 2019, Chennai, India, October 1–3, pp 1–8
Sahin DÖ, Akleylek S, Kiliç E (2021) On the effect of k values and distance metrics in KNN algorithm for android malware detection. Adv. Data Sci. Adapt. Anal. 13(3 &4):2141001–1214100120
Zulkifli A, Hamid IRA, Shah WM, Abdullah Z (2018) Android malware detection based on network traffic using decision tree algorithm. In: Ghazali, R., Deris, M.M., Nawi, N.M., Abawajy, J.H. (eds.) Recent Advances on Soft Computing and Data Mining - Proceedings of the Third International Conference on Soft Computing and Data Mining (SCDM 2018), Johor, Malaysia, February 06-07, 2018. Advances in Intelligent Systems and Computing, vol. 700, pp. 485–494
Alam MS, Vuong ST (2013) Random forest classification for detecting android malware. In: 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, Physical and Social Computing (CPSCom), Beijing, China, August 20-23, 2013, pp. 663–669
Grover A, Leskovec J (2016) node2vec: Scalable feature learning for networks. In: Krishnapuram B, Shah M, Smola AJ, Aggarwal CC, Shen D, Rastogi R. (eds.) Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Francisco, CA, USA, August 13-17, 2016, pp. 855–864
Perozzi B, Al-Rfou R (2014) Skiena S (2014) Deepwalk: online learning of social representations. In: Macskassy SA, Perlich C, Leskovec J, Wang W, Ghani R (eds) The 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. KDD ’14, New York, NY, USA - August 24–27, pp 701–710
Velickovic P, Cucurull G, Casanova A, Romero A, Liò P, Bengio Y (2017) Graph attention networks. arXiv:1710.10903
Gao H, Cheng S, Zhang W (2021) Gdroid: Android malware detection and classification with graph convolutional network. Comput Secur 106:102264
Wang X, Ji H, Shi C, Wang B, Ye Y, Cui P (2019) Yu PS (2019) Heterogeneous graph attention network. In: Liu L, White RW, Mantrach A, Silvestri F, McAuley JJ, Baeza-Yates R, Zia L (eds) The World Wide Web Conference. WWW 2019, San Francisco, CA, USA, May 13–17, pp 2022–2032
Yang Z, Yang D, Dyer C, He X, Smola AJ, Hovy EH (2016) Hierarchical attention networks for document classification. In: Knight K, Nenkova A, Rambow O. (eds.) NAACL HLT 2016, The 2016 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, San Diego California, USA, June 12-17, 2016, pp. 1480–1489
Acknowledgements
We would like to thank the anonymous reviewers for their valuable comments on this paper, which helped us identify problems and improve the quality of the paper.
Author information
Authors and Affiliations
Contributions
Kang Yang: Conceptualization, Methodology, Writing original draft. Lizhi Cai: Conceptualization, Methodology, Validation, Software. Jianhua Wu: Software, Validation, Writing. Zhenyu Liu: Supervision, Investigation, Writing. Meng Zhang: Resources, Writing.
Corresponding author
Ethics declarations
Competing Interests
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Ethical and informed consent for data used
This study did not involve human or animal subjects, and thus, no ethical approval was required. The study protocol adhered to the guidelines established by the journal.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Yang, K., Cai, L., Wu, J. et al. A reinforcement learning malware detection model based on heterogeneous information network path representation. Appl Intell 55, 538 (2025). https://doi.org/10.1007/s10489-025-06417-1
Accepted:
Published:
DOI: https://doi.org/10.1007/s10489-025-06417-1