A Hybrid Malicious Code Detection Method based on Deep Learning

被引:127
|
作者
Li, Yuancheng [1 ]
Ma, Rong [1 ]
Jiao, Runhai [1 ]
机构
[1] North China Elect Power Univ, Sch Control & Comp Engn, Beijing, Peoples R China
关键词
Malicious code Detection; AutoEncoder; DBN RBM; deep learning;
D O I
10.14257/ijsia.2015.9.5.21
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper; we propose a hybrid malicious code detection scheme based on AutoEncoder and DBN (Deep Belief Networks). Firstly, we use the AutoEncoder deep learning method to reduce the dimensionality of data. This could convert complicated high-dimensional data into low dimensional codes with the nonlinear mapping, thereby reducing the dimensionality of data, extracting the main features of the data; then using DBN learning method to detect malicious code. DBN is composed of multilayer Restricted Boltzmann Machines (RBM, Restricted Boltzmann Machine) and a layer of BP neural network. Based on unsupervised training of every layer of RBM, we make the output vector of the last layer of RBM as the input vectors of BP neural network, then conduct supervised training to the BP neural network, finally achieve the optimal hybrid model by fine-tuning the entire network. After inputting testing samples into the hybrid model, the experimental results show that the detection accuracy getting by the hybrid detection method proposed in this paper is higher than that of single DBN. The proposed method reduces the time complexity and has better detection performance.
引用
收藏
页码:205 / 215
页数:11
相关论文
共 50 条
  • [1] Detection of Malicious Code Variants Based on Deep Learning
    Cui, Zhihua
    Xue, Fei
    Cai, Xingjuan
    Cao, Yang
    Wang, Gai-ge
    Chen, Jinjun
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (07) : 3187 - 3196
  • [2] Detection Approach of Malicious JavaScript Code Based on deep learning
    Zheng, Liyuan
    Zhang, Dongcheng
    Xie, Xin
    Wang, Chen
    Hou, Boyuan
    [J]. Proceedings of 2023 IEEE 3rd International Conference on Information Technology, Big Data and Artificial Intelligence, ICIBA 2023, 2023, : 1075 - 1079
  • [3] Malicious Code Detection based on Image Processing Using Deep Learning
    Kumar, Rajesh
    Zhang Xiaosong
    Khan, Riaz Ullah
    Ahad, Ijaz
    Kumar, Jay
    [J]. PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON COMPUTING AND ARTIFICIAL INTELLIGENCE (ICCAI 2018), 2018, : 81 - 85
  • [4] Deep Learning Based Detection Method for SDN Malicious Applications
    Chi Yaping
    Yu Yuzhou
    Yang Jianxi
    [J]. COMMUNICATIONS, SIGNAL PROCESSING, AND SYSTEMS, CSPS 2018, VOL III: SYSTEMS, 2020, 517 : 96 - 104
  • [5] A hybrid quantum ensemble learning model for malicious code detection
    Xiong, Qibing
    Ding, Xiaodong
    Fei, Yangyang
    Zhou, Xin
    Du, Qiming
    Feng, Congcong
    Shan, Zheng
    [J]. QUANTUM SCIENCE AND TECHNOLOGY, 2024, 9 (03):
  • [6] A Hybrid Deep Learning Model for Malicious Behavior Detection
    Xu, Aidong
    Chen, Lin
    Kuang, Xiaoyun
    Lv, Huahui
    Yang, Hang
    Jiang, Yixin
    Li, Bo
    [J]. 2020 IEEE 6TH INT CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / 6TH IEEE INT CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) / 5TH IEEE INT CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2020, : 55 - 59
  • [7] Malicious Code Classification Method Based on Deep Forest
    Lu, Xi-Dong
    Duan, Zhe-Min
    Qian, Ye-Kui
    Zhou, Wei
    [J]. Ruan Jian Xue Bao/Journal of Software, 2020, 31 (05): : 1454 - 1464
  • [8] Research on malicious domain name detection method based on deep learning
    Ren, Fei
    Jiao, Di
    [J]. PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, NETWORK SECURITY AND COMMUNICATION TECHNOLOGY, CNSCT 2024, 2024, : 81 - 85
  • [9] Malicious Java']JavaScript Code Detection Based on Hybrid Analysis
    He, Xincheng
    Xu, Lei
    Cha, Chunliu
    [J]. 2018 25TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2018), 2018, : 365 - 374
  • [10] Malicious code dynamic traffic camouflage detection based on deep reinforcement learning in power system
    Tang Xiaoqiang
    He Bingzhe
    [J]. ENERGY REPORTS, 2022, 8 : 1424 - 1435