A Recurrent Neural Network-based Malicious Code Detection Technology

被引:0
|
作者
Tang, Yongwang [1 ]
Liu, Xin [1 ]
Jin, Yanqing [1 ]
Wei, Han [1 ]
Deng, Qizheng [1 ]
机构
[1] PLA Informat Engn Univ, Coll Informat Syst Engn, 2.-32088 Troops, Zhengzhou, Henan, Peoples R China
关键词
Recurrent Neural Network; LSTM Model; Sequenceization of Malicious Codes; In-depth Features; Malicious Code Detection;
D O I
10.1109/itaic.2019.8785580
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
For the problem existing in the current malicious code detection methods namely they severely depend on artificial feature extraction but can't extract in-depth features of malicious codes, a recurrent neural network-based malicious code detection method is proposed in this paper. First of all, malicious code data are preprocessed, binary data stream of each malicious code is read, and then malicious codes are sequenced by transforming each 8 bits into an unsigned integer. Secondly, LSTM (long and short-time memory) model is introduced in the recurrent neural network to solve its gradient vanishing problem. Finally, sequence data are input into the recurrent neural network in order to automatically extract in-depth features of malicious codes and train their classifiers. Experimental results indicate that the method proposed in this paper is practical and feasible. Compared with suboptimal results, accuracy is improved by 10.34% and false positive rate is reduced by 58.40%.
引用
收藏
页码:1737 / 1742
页数:6
相关论文
共 50 条
  • [1] Deep Neural Network-based Method for Detection and Classification of Malicious Network Traffic
    Usman, Muhammad
    Ahmad, Shahbaz
    Saeed, Muhammad Mubashir
    2021 IEEE WORKSHOP ON MICROWAVE THEORY AND TECHNIQUES IN WIRELESS COMMUNICATIONS, MTTW'21, 2021, : 193 - 198
  • [2] POSTER: Neural Network-based Graph Embedding for Malicious Accounts Detection
    Liu, Ziqi
    Chen, ChaoChao
    Zhou, Jun
    Li, Xiaolong
    Xu, Feng
    Chen, Tao
    Song, Le
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 2543 - 2545
  • [3] Detection technology of malicious code based on semantic
    Lu, Qingmei
    Wang, Yulin
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (19) : 19543 - 19555
  • [4] Detection technology of malicious code based on semantic
    Qingmei Lu
    Yulin Wang
    Multimedia Tools and Applications, 2017, 76 : 19543 - 19555
  • [5] Network-based detection of Android malicious apps
    Shree Garg
    Sateesh K. Peddoju
    Anil K. Sarje
    International Journal of Information Security, 2017, 16 : 385 - 400
  • [6] Network-based detection of Android malicious apps
    Garg, Shree
    Peddoju, Sateesh K.
    Sarje, Anil K.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2017, 16 (04) : 385 - 400
  • [7] An Empirical Comparison on Malicious Activity Detection Using Different Neural Network-Based Models
    Albahar, Marwan A.
    Al-Falluji, Ruaa A.
    Binsawad, Muhammad
    IEEE ACCESS, 2020, 8 (08) : 61549 - 61564
  • [8] Bidirectional LSTM Malicious webpages detection algorithm based on convolutional neural network and independent recurrent neural network
    Huan-huan Wang
    Long Yu
    Sheng-wei Tian
    Yong-fang Peng
    Xin-jun Pei
    Applied Intelligence, 2019, 49 : 3016 - 3026
  • [9] Deep Recurrent Neural Network-Based Autoencoders for Acoustic Novelty Detection
    Marchi, Erik
    Vesperini, Fabio
    Squartini, Stefano
    Schuller, Bjoern
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2017, 2017
  • [10] Bidirectional LSTM Malicious webpages detection algorithm based on convolutional neural network and independent recurrent neural network
    Wang, Huan-huan
    Yu, Long
    Tian, Sheng-wei
    Peng, Yong-fang
    Pei, Xin-jun
    APPLIED INTELLIGENCE, 2019, 49 (08) : 3016 - 3026