A Novel Malware Detection Model in the Software Supply Chain Based on LSTM and SVMs

被引:0
|
作者
Zhou, Shuncheng [1 ]
Li, Honghui [1 ]
Fu, Xueliang [1 ]
Jiao, Yuanyuan [1 ]
机构
[1] Inner Mongolia Agr Univ, Coll Comp & Informat Engn, Hohhot 010018, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2024年 / 14卷 / 15期
基金
中国国家自然科学基金;
关键词
software supply chain; malware detection; long short-term memory network; Bayesian optimization algorithm; support vector machine;
D O I
10.3390/app14156678
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
With the increasingly severe challenge of Software Supply Chain (SSC) security, the rising trend in guarding against security risks has attracted widespread attention. Existing techniques still face challenges in both accuracy and efficiency when detecting malware in SSC. To meet this challenge, this paper introduces two novel models, named the Bayesian Optimization-based Support Vector Machine (BO-SVM) and the Long Short-Term Memory-BO-SVM (LSTM-BO-SVM). The BO-SVM model is constructed on an SVM foundation, with its hyperparameters optimized by Bayesian Optimization. To further enhance its accuracy and efficiency, the LSTM-BO-SVM model is proposed, building upon BO-SVM and employing LSTM networks for pre-classification. Extensive experiments were conducted on two datasets: the balanced ClaMP dataset and the unbalanced CICMalDroid-2020 dataset. The experimental results indicate that the BO-SVM model is superior to other models in terms of accuracy; the accuracy of the LSTM-BO-SVM model on the two datasets is 98.2% and 98.6%, respectively, which is 2.9% and 2.2% higher than that of the BO-SVM on these two datasets.
引用
收藏
页数:24
相关论文
共 50 条
  • [1] Supply chain sales forecasting based on lightGBM and LSTM combination model
    Weng, Tingyu
    Liu, Wenyang
    Xiao, Jun
    INDUSTRIAL MANAGEMENT & DATA SYSTEMS, 2020, 120 (02) : 265 - 279
  • [2] DroidChain: A Novel Malware Detection Method for Android based on Behavior Chain
    Wang, Zhaoguo
    Li, Chenglong
    Guan, Yi
    Xue, Yibo
    2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 727 - 728
  • [3] Android malware detection based on system call sequences and LSTM
    Xiao, Xi
    Zhang, Shaofeng
    Mercaldo, Francesco
    Hu, Guangwu
    Sangaiah, Arun Kumar
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (04) : 3979 - 3999
  • [4] Android malware detection based on system call sequences and LSTM
    Xi Xiao
    Shaofeng Zhang
    Francesco Mercaldo
    Guangwu Hu
    Arun Kumar Sangaiah
    Multimedia Tools and Applications, 2019, 78 : 3979 - 3999
  • [5] Collaborative intelligent diagnosis on supply chain partnerships based on the integration of ES and SVMs
    Li, Hui
    Li, Xiangyang
    Sun, He
    WCICA 2006: SIXTH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-12, CONFERENCE PROCEEDINGS, 2006, : 7023 - 7028
  • [6] A supply chain model for software components management
    Dai, W
    Rubin, SH
    PROCEEDINGS OF THE 2003 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION, 2003, : 69 - 76
  • [7] LSTM-Based Hierarchical Denoising Network for Android Malware Detection
    Yan, Jinpei
    Qi, Yong
    Rao, Qifan
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [8] Hybrid Deep Learning Approach Based on LSTM and CNN for Malware Detection
    Thakur, Preeti
    Kansal, Vineet
    Rishiwal, Vinay
    WIRELESS PERSONAL COMMUNICATIONS, 2024, 136 (03) : 1879 - 1901
  • [9] A Behavior-based Mobile Malware Detection Model in Software-Defined Networking
    Tri-Hai Nguyen
    Yoo, Myungsik
    2017 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND COMMUNICATIONS TECHNOLOGIES (ICISCT) - APPLICATIONS, TRENDS AND OPPORTUNITIES, 2017,
  • [10] SoK: Practical Detection of Software Supply Chain Attacks
    Ohm, Marc
    Stuke, Charlene
    18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,