IDEAS home Printed from https://ideas.repec.org/h/spr/sprchp/978-3-031-83157-7_6.html
   My bibliography  Save this book chapter

Applying Word Embeddings and Graph Neural Networks for Effective Malware Classification

In: Machine Learning, Deep Learning and AI for Cybersecurity

Author

Listed:
  • Manasa Mananjaya

    (San Jose State University)

  • Fabio Di Troia

    (San Jose State University)

Abstract

The significance of word embeddings in natural language processing for capturing semantic relationships between words is widely acknowledged. This study aims to explore the efficacy of word embedding techniques in classifying malware. Specifically, we evaluate the effectiveness of applying Graph Neural Networks (GNNs) to weighted graphs formed from word embeddings generated by analyzing opcode sequences in malware files. In the initial experiments, we employ the Graph Convolution Network (GCN) on weighted graphs generated using different word embedding techniques, including Bag-of-words, TF-IDF, and Word2Vec. The results indicate that Word2Vec provides the most effective word embeddings, serving as the baseline for comparison with three GNN models, namely Graph Convolution Network, Graph Attention Network (GAT), and GraphSAGE Network. Subsequently, we conduct further experiments, generating vector embeddings of varying lengths using Word2Vec, and utilizing these embeddings as node features for constructing weighted graphs. Through performance comparison of the GNN models, we demonstrate that larger vector embeddings significantly enhance the models’ ability to classify malware files into their respective families. Furthermore, we compare the result achieved using Word2Vec embeddings against those obtained through contextualized embeddings from BERT. Overall, our experiments show the potential of word embeddings as node features for GNN classification, with an increase in accuracy from 71.6 to 91.91% when Word2Vec embeddings were used in combination with GCN.

Suggested Citation

  • Manasa Mananjaya & Fabio Di Troia, 2025. "Applying Word Embeddings and Graph Neural Networks for Effective Malware Classification," Springer Books, in: Mark Stamp & Martin Jureček (ed.), Machine Learning, Deep Learning and AI for Cybersecurity, pages 143-167, Springer.
  • Handle: RePEc:spr:sprchp:978-3-031-83157-7_6
    DOI: 10.1007/978-3-031-83157-7_6
    as

    Download full text from publisher

    To our knowledge, this item is not available for download. To find whether it is available, there are three options:
    1. Check below whether another version of this item is available online.
    2. Check on the provider's web page whether it is in fact available.
    3. Perform a
    for a similarly titled item that would be available.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:sprchp:978-3-031-83157-7_6. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.