A Full-Lifecycle Malicious Code Detection Scheme Based on RASP and Random Forest

被引:0
|
作者
Cheng, Jiameng [1 ]
Zhang, Chenhao [1 ]
Zhang, Hongwei [1 ]
Wang, Cong [2 ]
Wang, Jinsong [1 ]
机构
[1] Tianjin Univ Technol, Sch Comp Sci & Engn, Tianjin 300384, Peoples R China
[2] Tianjin Univ Sci & Technol, Sch Comp Sci & Engn, Tianjin 300457, Peoples R China
关键词
Malicious code detection; Random forest; RASP; Computing power leasing;
D O I
10.1007/978-981-97-5666-7_24
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As cloud computing continues to evolve, computational power leasing has emerged as a novel web service model, providing users with access to computing resources or cloud computing capabilities. This enables users to offload their computational tasks to remote devices and retrieve results. However, with the exponential growth in data generation, cloud service providers are confronted with the critical challenge of differentiating malicious code within a vast array of computing tasks. To address this issue, this paper proposes a comprehensive lifecycle malicious code detection framework that integrates Runtime Application Self-Protection (RASP) with random forest technology, facilitating rapid and accurate identification of malicious code. Experimental results demonstrate that the intelligent detection process using random forest yields better performance compared to other machine learning algorithms. By training the intelligent detection model with features selected in this paper, a high accuracy rate of up to 95.10% is achieved on the collected G4 sample set. Additionally, the proposed framework achieves the highest accuracy rate among other schemes on the G1 sample set, reaching 98.07%. This research offers an effective security measure for computational power leasing providers in this domain.
引用
收藏
页码:281 / 293
页数:13
相关论文
共 50 条
  • [1] A kind of Malicious Code Detection Scheme based on Fuzzy Reasoning
    Gang, Guo
    Chen Zhongquan
    [J]. 2014 7TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION (ICICTA), 2014, : 19 - 22
  • [2] Malicious Code Utilization Chain Detection Scheme based on Abstract Syntax Tree
    Si, Guanlin
    Zhang, Yue
    Li, Min
    Jing, Sen
    [J]. 2022 IEEE 6TH ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC), 2022, : 1108 - 1111
  • [3] Malicious Code Detection Based on Code Semantic Features
    Zhang, Yu
    Li, Binglong
    [J]. IEEE ACCESS, 2020, 8 : 176728 - 176737
  • [4] Malicious Code Classification Method Based on Deep Forest
    Lu, Xi-Dong
    Duan, Zhe-Min
    Qian, Ye-Kui
    Zhou, Wei
    [J]. Ruan Jian Xue Bao/Journal of Software, 2020, 31 (05): : 1454 - 1464
  • [5] Detection technology of malicious code based on semantic
    Lu, Qingmei
    Wang, Yulin
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (19) : 19543 - 19555
  • [6] Malicious Code Detection Based on Software Fingerprint
    Yin, Zhimin
    Yu, Xiangzhan
    Niu, Linhua
    [J]. PROCEEDINGS OF THE 2013 THE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND SOFTWARE ENGINEERING (ICAISE 2013), 2013, 37 : 212 - 216
  • [7] Detection technology of malicious code based on semantic
    Qingmei Lu
    Yulin Wang
    [J]. Multimedia Tools and Applications, 2017, 76 : 19543 - 19555
  • [8] Unknown Malicious Code Detection Based on Bayesian
    Lai, Yingxu
    Liu, Zhenghui
    [J]. CEIS 2011, 2011, 15
  • [9] BIM Modeling-Based Full-Lifecycle Carbon Emissions Model Study on Ancillary Building Facilities of Highway
    Liu, Qibo
    Ren, Juan
    [J]. CICTP 2020: TRANSPORTATION EVOLUTION IMPACTING FUTURE MOBILITY, 2020, : 3536 - 3547
  • [10] Design of malicious code detection system based on binar code slicin
    Zhang, Zhiyuan
    Zhang, Zhenjiang
    Li, Wei
    Zhou, Hongde
    Shen, Bo
    [J]. Journal of Computers (Taiwan), 2021, 32 (04) : 225 - 238