A Full-Lifecycle Malicious Code Detection Scheme Based on RASP and Random Forest

被引:0
|
作者
Cheng, Jiameng [1 ]
Zhang, Chenhao [1 ]
Zhang, Hongwei [1 ]
Wang, Cong [2 ]
Wang, Jinsong [1 ]
机构
[1] Tianjin Univ Technol, Sch Comp Sci & Engn, Tianjin 300384, Peoples R China
[2] Tianjin Univ Sci & Technol, Sch Comp Sci & Engn, Tianjin 300457, Peoples R China
关键词
Malicious code detection; Random forest; RASP; Computing power leasing;
D O I
10.1007/978-981-97-5666-7_24
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As cloud computing continues to evolve, computational power leasing has emerged as a novel web service model, providing users with access to computing resources or cloud computing capabilities. This enables users to offload their computational tasks to remote devices and retrieve results. However, with the exponential growth in data generation, cloud service providers are confronted with the critical challenge of differentiating malicious code within a vast array of computing tasks. To address this issue, this paper proposes a comprehensive lifecycle malicious code detection framework that integrates Runtime Application Self-Protection (RASP) with random forest technology, facilitating rapid and accurate identification of malicious code. Experimental results demonstrate that the intelligent detection process using random forest yields better performance compared to other machine learning algorithms. By training the intelligent detection model with features selected in this paper, a high accuracy rate of up to 95.10% is achieved on the collected G4 sample set. Additionally, the proposed framework achieves the highest accuracy rate among other schemes on the G1 sample set, reaching 98.07%. This research offers an effective security measure for computational power leasing providers in this domain.
引用
收藏
页码:281 / 293
页数:13
相关论文
共 50 条
  • [21] Malicious code detection in compound documents based on spectral analyses
    [J]. Liu, L. (liul@itsec.gov.cn), 1713, Tsinghua University (53):
  • [22] A Fast Malicious Code Detection Method Based on Feature Fusion
    Wang, Shuo
    Wang, Jian
    Wang, Ya-Nan
    Song, Ya-Fei
    [J]. Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2023, 51 (01): : 57 - 66
  • [23] Malicious code clone detection technology based on deep learning
    Shen, Yuan
    Yan, Hanbing
    Xia, Chunhe
    Han, Zhihui
    [J]. Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2022, 48 (02): : 282 - 290
  • [24] A Hybrid Malicious Code Detection Method based on Deep Learning
    Li, Yuancheng
    Ma, Rong
    Jiao, Runhai
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (05): : 205 - 215
  • [25] Detection Method of WEB Malicious Code based on Link Analysis
    Lu Zhiyong
    Sui Sai
    Huang Chengdong
    Wang Xueyu
    [J]. 2016 INTERNATIONAL SYMPOSIUM ON COMPUTER, CONSUMER AND CONTROL (IS3C), 2016, : 511 - 514
  • [26] Research on malicious code variants detection based on texture fingerprint
    Han, Xiao-Guang
    Qu, Wu
    Yao, Xuan-Xia
    Guo, Chang-You
    Zhou, Fang
    [J]. Tongxin Xuebao/Journal on Communications, 2014, 35 (08): : 125 - 136
  • [27] A Malicious Code Detection Method Based on Ensemble Learning of Behavior
    Xu, Xiao-Bo
    Zhang, Wen-Bo
    He, Chao
    Luo, Yi
    [J]. Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2019, 42 (04): : 89 - 95
  • [28] Detection Approach of Malicious JavaScript Code Based on deep learning
    Zheng, Liyuan
    Zhang, Dongcheng
    Xie, Xin
    Wang, Chen
    Hou, Boyuan
    [J]. Proceedings of 2023 IEEE 3rd International Conference on Information Technology, Big Data and Artificial Intelligence, ICIBA 2023, 2023, : 1075 - 1079
  • [29] A method for efficient malicious code detection based on conceptual similarity
    Kim, Sungsuk
    Choi, Chang
    Choi, Junho
    Kim, Pankoo
    Kim, Hanil
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 4, 2006, 3983 : 567 - 576
  • [30] Malicious Java']JavaScript Code Detection Based on Hybrid Analysis
    He, Xincheng
    Xu, Lei
    Cha, Chunliu
    [J]. 2018 25TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2018), 2018, : 365 - 374