JIEAS OPEN ACCESS

Journal of Industrial Engineering and Applied Science

ISSN:3005-608X (print) | ISSN:3005-6071 (online) | Publication Frequency: Bimonthly

OPEN ACCESS|Research Article||1 April 2025

Trojan Virus Detection and Classification Based on Graph Convolutional Neural Network Algorithm

* Corresponding Author1: Wenkun Ren, E-Mail: charlsiexno9@gmail.com

Publication

Accepted 2025 March 11 ; Published 2025 April 1

Journal of Industrial Engineering and Applied Science, 2025, 3(2), 3005-6071.

Abstract

This article proposes a new method for Trojan virus detection and classification based on graph convolutional neural network (GCN) algorithm. By observing the performance evaluation indicators of the model during the training process, the accuracy of the model continued to improve from the initial 64.27% to 88.28% and gradually stabilized, proving that the model can effectively identify Trojan viruses during the training process. In addition, confusion matrix analysis based on the training set shows that the model performs quite well in classification tasks, with an overall accuracy of 91.06%, precision of 89.24, recall of 92.63, and F1 score of 90.91. These indicators indicate that the model can demonstrate good performance in detecting Trojan viruses from various perspectives. On the test set, the model also demonstrated excellent performance, with an accuracy rate of 90.96%, an accuracy rate of 90%, a recall rate of 91.43%, and an F1 score of 90.71. By analyzing the confusion matrix of the test dataset, it can be seen that the classification performance of the model in practical applications is similar to that on the training set, further verifying its good generalization ability. In summary, the experimental results in this article demonstrate that the Trojan virus detection method based on graph convolutional neural networks has high accuracy and stability, and demonstrates superior performance compared to traditional detection methods. This method provides new ideas and technical support for Trojan virus detection in the field of network security, which can effectively respond to increasingly complex network security threats and provide theoretical basis and practical guidance for related research and applications. Through further optimization and improvement, the method proposed in this article is expected to play a greater role in future Trojan virus detection, helping to enhance the level of network security protection.

Keywords

Trojan Virus , Graph Convolutional Neural Network , Virus Detection and Classification .

Metadata

Pages: 1-5

References: 16

Disciplines: Computer Science

Subjects: Cybersecurity

Cite This Article

APA Style

Ren, W., Xiao, X., Xu, J., Chen, H., Zhang, Y. & Zhang, J. (2025). Trojan virus detection and classification based on graph convolutional neural network algorithm. Journal of Industrial Engineering and Applied Science, 3(2), 1-5. https://doi.org/10.70393/6a69656173.323735

Acknowledgments

The authors thank the editor and anonymous reviewers for their helpful comments and valuable suggestions.

FUNDING

Not applicable.

INSTITUTIONAL REVIEW BOARD STATEMENT

Not applicable.

DATA AVAILABILITY STATEMENT

The original contributions presented in the study are included in the article/supplementary material, further inquiries can be directed to the corresponding author.

INFORMED CONSENT STATEMENT

Not applicable.

CONFLICT OF INTEREST

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

AUTHOR CONTRIBUTIONS

Not applicable.

References

1.
Chen, H., Shen, Z., Wang, Y. and Xu, J., 2024. Threat Detection Driven by Artificial Intelligence: Enhancing Cybersecurity with Machine Learning Algorithms.

2.
Ullah, S., Ahmad, T., Buriro, A., Zara, N., & Saha, S. (2022). TrojanDetector: a multi-layer hybrid approach for trojan detection in android applications. Applied Sciences, 12(21), 10755.

3.
Liang, X., & Chen, H. (2019, July). A SDN-Based Hierarchical Authentication Mechanism for IPv6 Address. In 2019 IEEE International Conference on Intelligence and Security Informatics (ISI) (pp. 225-225). IEEE.

4.
Nenov, L., Kassev, K., & Chanev, D. (2021, September). Investigation of algorithms for virus detection using neural networks and machine learning. In 2021 Sixth Junior Conference on Lighting (Lighting) (pp. 1-4). IEEE.

5.
Liang, X., & Chen, H. (2019, August). HDSO: A High-Performance Dynamic Service Orchestration Algorithm in Hybrid NFV Networks. In 2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS) (pp. 782-787). IEEE.

6.
Riadi, I., & Aprilliansyah, D. (2023). Analysis of Anubis Trojan Attack on Android Banking Application Using Mobile Security Labware. International Journal of Safety & Security Engineering, 13(1).

7.
Chen, H., & Bian, J. (2019, February). Streaming media live broadcast system based on MSE. In Journal of Physics: Conference Series (Vol. 1168, No. 3, p. 032071). IOP Publishing.

8.
Kanaker, H., Karim, N. A., Awwad, S. A., Ismail, N. H., & Zraqou, J. (2022). Trojan Horse Infection Detection in Cloud Based Environment Using Machine Learning. International Journal of Interactive Mobile Technologies, 16(24).

9.
Ke, Z., & Yin, Y. (2024). Tail Risk Alert Based on Conditional Autoregressive VaR by Regression Quantiles and Machine Learning Algorithms. arXiv preprint arXiv:2412.06193

10.
Zanluqui, N. G., Oliveira, L. G., Polonio, C. M., França, T. T., De Souza, G. P., Muraro, S. P., ... & Peron, J. P. S. (2021). Zika Virus Infection of Murine and Human Neutrophils and Their Function as Trojan Horses to the Placenta. BioRxiv, 2021-09.

11.
Ke, Z., Xu, J., Zhang, Z., Cheng, Y., & Wu, W. (2024). A Consolidated Volatility Prediction with Back Propagation Neural Network and Genetic Algorithm. arXiv preprint arXiv:2412.07223

12.
Yu, Q., Xu, Z., & Ke, Z. (2024). Deep Learning for Cross-Border Transaction Anomaly Detection in Anti-Money Laundering Systems. arXiv preprint arXiv:2412.07027.

13.
Hendrawan, A. H., Kurniawan, R., Aprian, A. J., Primasari, D., & Subchan, M. (2024). Enhancing Cybersecurity Through Live Forensic Investigation of Remote Access Trojan Attacks using FTK Imager Software. International Journal of Safety & Security Engineering, 14(1).

14.
Hu, Z., Lei, F., Fan, Y., Ke, Z., Shi, G., & Li, Z. (2024). Research on Financial Multi-Asset Portfolio Risk Prediction Model Based on Convolutional Neural Networks and Image Processing. arXiv preprint arXiv:2412.03618.

15.
Xu, J., Chen, H., Xiao, X., Zhao, M., Liu, B. (2025). Gesture Object Detection and Recognition Based on YOLOv11.Applied and Computational Engineering,133,81-89.

16.
Chiwariro, R., & Pullagura, L. (2023). Malware detection and classification using machine learning algorithms. Int J Res Appl Sci Eng Technol, 11(8), 1727-1738.

PUBLISHER'S NOTE

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.

cc Copyright © 2025 The Author(s). Published by Southern United Academy of Sciences.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
t