A Hybrid Malicious Code Detection Method based on Deep Learning

被引:127
|
作者
Li, Yuancheng [1 ]
Ma, Rong [1 ]
Jiao, Runhai [1 ]
机构
[1] North China Elect Power Univ, Sch Control & Comp Engn, Beijing, Peoples R China
关键词
Malicious code Detection; AutoEncoder; DBN RBM; deep learning;
D O I
10.14257/ijsia.2015.9.5.21
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper; we propose a hybrid malicious code detection scheme based on AutoEncoder and DBN (Deep Belief Networks). Firstly, we use the AutoEncoder deep learning method to reduce the dimensionality of data. This could convert complicated high-dimensional data into low dimensional codes with the nonlinear mapping, thereby reducing the dimensionality of data, extracting the main features of the data; then using DBN learning method to detect malicious code. DBN is composed of multilayer Restricted Boltzmann Machines (RBM, Restricted Boltzmann Machine) and a layer of BP neural network. Based on unsupervised training of every layer of RBM, we make the output vector of the last layer of RBM as the input vectors of BP neural network, then conduct supervised training to the BP neural network, finally achieve the optimal hybrid model by fine-tuning the entire network. After inputting testing samples into the hybrid model, the experimental results show that the detection accuracy getting by the hybrid detection method proposed in this paper is higher than that of single DBN. The proposed method reduces the time complexity and has better detection performance.
引用
收藏
页码:205 / 215
页数:11
相关论文
共 50 条
  • [41] Unknown Malicious Code Detection Based on Bayesian
    Lai, Yingxu
    Liu, Zhenghui
    [J]. CEIS 2011, 2011, 15
  • [42] Detection of Malicious Webpages Using Deep Learning
    Singh, A. K.
    Goyal, Navneet
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2021, : 3370 - 3379
  • [43] A Malicious Mining Code Detection Method Based on Multi-Features Fusion
    Li, Shudong
    Jiang, Laiyuan
    Zhang, Qianqing
    Wang, Zhen
    Tian, Zhihong
    Guizani, Mohsen
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2023, 10 (05): : 2731 - 2739
  • [44] A Malicious Code Detection Method Based on FF-MICNN in the Internet of Things
    Zhang, Wenbo
    Feng, Yongxin
    Han, Guangjie
    Zhu, Hongbo
    Tan, Xiaobo
    [J]. SENSORS, 2022, 22 (22)
  • [45] Political Optimization Algorithm with a Hybrid Deep Learning Assisted Malicious URL Detection Model
    Aljebreen, Mohammed
    Alrayes, Fatma S.
    Aljameel, Sumayh S.
    Saeed, Muhammad Kashif
    [J]. SUSTAINABILITY, 2023, 15 (24)
  • [46] A Multiple Pattern Matching Method for Malicious Code Detection
    Huang, Der-Chen
    Lo, Hung-Cheng
    Lai, Ping-Liang
    Chen, Wei-Ming
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2012, 13 (02): : 181 - 193
  • [47] PBDG: a malicious code detection method based on precise behaviour dependency graph
    Tang, Chenghua
    Yang, Mengmeng
    Gao, Qingze
    Qiang, Baohua
    [J]. INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2024, 23 (02)
  • [48] Source Code Defect Detection Based on Deep Learning
    Wang, Xiao-Meng
    Zhang, Tao
    Xin, Wei
    Hou, Chang-Yu
    [J]. Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology, 2019, 39 (11): : 1155 - 1159
  • [49] Multilingual code refactoring detection based on deep learning
    Li, Tao
    Zhang, Yang
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2024, 258
  • [50] OMRDetector: A Method for Detecting Obfuscated Malicious Requests Based on Deep Learning
    Yang, Xiu-Zhang
    Peng, Guo-Jun
    Luo, Yuan
    Song, Wen-Na
    Zhang, Jie
    Cao, Fang-Tao
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2022, 45 (10): : 2167 - 2189