A Novel Malware Detection Model in the Software Supply Chain Based on LSTM and SVMs

被引:0
|
作者
Zhou, Shuncheng [1 ]
Li, Honghui [1 ]
Fu, Xueliang [1 ]
Jiao, Yuanyuan [1 ]
机构
[1] Inner Mongolia Agr Univ, Coll Comp & Informat Engn, Hohhot 010018, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2024年 / 14卷 / 15期
基金
中国国家自然科学基金;
关键词
software supply chain; malware detection; long short-term memory network; Bayesian optimization algorithm; support vector machine;
D O I
10.3390/app14156678
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
With the increasingly severe challenge of Software Supply Chain (SSC) security, the rising trend in guarding against security risks has attracted widespread attention. Existing techniques still face challenges in both accuracy and efficiency when detecting malware in SSC. To meet this challenge, this paper introduces two novel models, named the Bayesian Optimization-based Support Vector Machine (BO-SVM) and the Long Short-Term Memory-BO-SVM (LSTM-BO-SVM). The BO-SVM model is constructed on an SVM foundation, with its hyperparameters optimized by Bayesian Optimization. To further enhance its accuracy and efficiency, the LSTM-BO-SVM model is proposed, building upon BO-SVM and employing LSTM networks for pre-classification. Extensive experiments were conducted on two datasets: the balanced ClaMP dataset and the unbalanced CICMalDroid-2020 dataset. The experimental results indicate that the BO-SVM model is superior to other models in terms of accuracy; the accuracy of the LSTM-BO-SVM model on the two datasets is 98.2% and 98.6%, respectively, which is 2.9% and 2.2% higher than that of the BO-SVM on these two datasets.
引用
收藏
页数:24
相关论文
共 50 条
  • [21] Behavior-based features model for malware detection
    Galal H.S.
    Mahdy Y.B.
    Atiea M.A.
    Journal of Computer Virology and Hacking Techniques, 2016, 12 (2) : 59 - 67
  • [22] A TAN based hybrid model for android malware detection
    Surendran, Roopak
    Thomas, Tony
    Emmanuel, Sabu
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 54
  • [23] A Lightweight Malware Detection Model Based on Knowledge Distillation
    Miao, Chunyu
    Kou, Liang
    Zhang, Jilin
    Dong, Guozhong
    MATHEMATICS, 2024, 12 (24)
  • [24] Quorum Chain-Based Malware Detection in Android Smart Devices
    Gao, Fei
    Jiang, Frank
    Zhang, Yuping
    Doss, Robin
    FUTURE NETWORK SYSTEMS AND SECURITY, FNSS 2019, 2019, 1113 : 212 - 224
  • [25] RaNetMalDozer: A Novel NN -Based Model for Android Malware Detection Over Task Kernel Structures
    Wang, Xinning
    Li, Chong
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING (ICA3PP 2019), PT I, 2020, 11944 : 501 - 517
  • [26] A Novel Eccentric Intrusion Detection Model Based on Recurrent Neural Networks with Leveraging LSTM
    Muthunambu, Navaneetha Krishnan
    Prabakaran, Senthil
    Kavin, Balasubramanian Prabhu
    Siruvangur, Kishore Senthil
    Chinnadurai, Kavitha
    Ali, Jehad
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 78 (03): : 3089 - 3127
  • [27] Diagnosis of Port Supply Chain Based on Supply Chain Operations Reference Model
    Wang, Yanliang
    Du, Weijia
    JOURNAL OF COASTAL RESEARCH, 2019, : 117 - 120
  • [28] Enhancing Software Reliability and Fault Detection Using Hybrid Brainstorm Optimization-Based LSTM Model
    Raamesh, Lilly
    Jothi, S.
    Radhika, S.
    IETE JOURNAL OF RESEARCH, 2023, 69 (12) : 8789 - 8803
  • [29] A Novel Model based on Nonlinear Manifold Detection for Software Defect Prediction
    Ghosh, Soumi
    Kansal, Vineet
    Rana, Ajay
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2018, : 140 - 145
  • [30] CPL-Net: A Malware Detection Network Based on Parallel CNN and LSTM Feature Fusion
    Lu, Jun
    Ren, Xiaokai
    Zhang, Jiaxin
    Wang, Ting
    ELECTRONICS, 2023, 12 (19)