MalGA-LSTM: a malicious code detection model based on genetic algorithm optimising LSTM trainable parameters

被引:0
|
作者
Zhang Y. [1 ]
Feng Y. [1 ]
Zhao Y. [1 ]
机构
[1] School of Information Science and Engineering, Shenyang Ligong University, Shengyang
关键词
deep neural network; genetic algorithm; long and short-term memory; LSTM; malicious code detection; word2vec;
D O I
10.1504/IJSN.2023.134131
中图分类号
学科分类号
摘要
With the development of internet technology, the number of malicious software is also growing rapidly, causing great potential for cybersecurity issues. When using neural network to identify and detect malicious code, the traditional gradient descent method is easy to fall into local optimum and sensitive to the initial weight of the network. In order to solve these problems, a method using genetic algorithm (GA) to optimise LSTM trainable parameters for malicious code detection is proposed in this study. First, the API sequence called by malicious code was transformed into word2vec word vector, then genetic algorithm was used to optimise the trainable parameters in the network. The experimental results showed that the accuracy of the LSTM model optimised by genetic algorithm in the training set was more than 15% higher than that of the traditional gradient descent method, reaching 94.53%, and the accuracy in the testing set was more than 10% higher than that of the traditional gradient descent method, reaching more than 86%. © 2023 Inderscience Enterprises Ltd.. All rights reserved.
引用
收藏
页码:133 / 142
页数:9
相关论文
共 50 条
  • [1] Malicious Java']JavaScript Detection Based on Bidirectional LSTM Model
    Song, Xuyan
    Chen, Chen
    Cui, Baojiang
    Fu, Junsong
    APPLIED SCIENCES-BASEL, 2020, 10 (10):
  • [2] Malicious Domain Name Detection Model Based on CNN and LSTM
    Zhang Bin
    Liao Renjie
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2021, 43 (10) : 2944 - 2951
  • [3] Malicious Code Detection: Run Trace Output Analysis by LSTM
    Acarturk, Cengiz
    Sirlanci, Melih
    Balikcioglu, Pinar Gurkan
    Demirci, Deniz
    Sahin, Nazenin
    Kucuk, Ozge Acar
    IEEE ACCESS, 2021, 9 : 9625 - 9635
  • [4] Research on Malicious Java']JavaScript Detection Technology Based on LSTM
    Fang, Yong
    Huang, Cheng
    Liu, Liang
    Xue, Min
    IEEE ACCESS, 2018, 6 : 59118 - 59125
  • [5] Trajectory outlier detection algorithm based on Bi-LSTM model
    Han Z.
    Huang T.
    Ren W.
    Xu G.
    Journal of Radars, 2019, 8 (01) : 36 - 43
  • [6] Malicious Mail Filtering and Tracing System Based on KNN and Improved LSTM Algorithm
    Xiao, Da
    Jiang, Meiyi
    2020 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2020, : 222 - 229
  • [7] A CNN-LSTM Stock Prediction Model Based on Genetic Algorithm Optimization
    Baek, Heon
    ASIA-PACIFIC FINANCIAL MARKETS, 2024, 31 (02) : 205 - 220
  • [8] Bidirectional LSTM Malicious webpages detection algorithm based on convolutional neural network and independent recurrent neural network
    Huan-huan Wang
    Long Yu
    Sheng-wei Tian
    Yong-fang Peng
    Xin-jun Pei
    Applied Intelligence, 2019, 49 : 3016 - 3026
  • [9] Bidirectional LSTM Malicious webpages detection algorithm based on convolutional neural network and independent recurrent neural network
    Wang, Huan-huan
    Yu, Long
    Tian, Sheng-wei
    Peng, Yong-fang
    Pei, Xin-jun
    APPLIED INTELLIGENCE, 2019, 49 (08) : 3016 - 3026
  • [10] Optimization of LSTM Parameters for Flash Flood Forecasting Using Genetic Algorithm
    You-Da Jhong
    Chang-Shian Chen
    Bing-Chen Jhong
    Cheng-Han Tsai
    Song-Yue Yang
    Water Resources Management, 2024, 38 : 1141 - 1164