A Full-Lifecycle Malicious Code Detection Scheme Based on RASP and Random Forest

被引:0
|
作者
Cheng, Jiameng [1 ]
Zhang, Chenhao [1 ]
Zhang, Hongwei [1 ]
Wang, Cong [2 ]
Wang, Jinsong [1 ]
机构
[1] Tianjin Univ Technol, Sch Comp Sci & Engn, Tianjin 300384, Peoples R China
[2] Tianjin Univ Sci & Technol, Sch Comp Sci & Engn, Tianjin 300457, Peoples R China
关键词
Malicious code detection; Random forest; RASP; Computing power leasing;
D O I
10.1007/978-981-97-5666-7_24
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As cloud computing continues to evolve, computational power leasing has emerged as a novel web service model, providing users with access to computing resources or cloud computing capabilities. This enables users to offload their computational tasks to remote devices and retrieve results. However, with the exponential growth in data generation, cloud service providers are confronted with the critical challenge of differentiating malicious code within a vast array of computing tasks. To address this issue, this paper proposes a comprehensive lifecycle malicious code detection framework that integrates Runtime Application Self-Protection (RASP) with random forest technology, facilitating rapid and accurate identification of malicious code. Experimental results demonstrate that the intelligent detection process using random forest yields better performance compared to other machine learning algorithms. By training the intelligent detection model with features selected in this paper, a high accuracy rate of up to 95.10% is achieved on the collected G4 sample set. Additionally, the proposed framework achieves the highest accuracy rate among other schemes on the G1 sample set, reaching 98.07%. This research offers an effective security measure for computational power leasing providers in this domain.
引用
收藏
页码:281 / 293
页数:13
相关论文
共 50 条
  • [41] An Android Malicious Code Detection Method Based on Improved DCA Algorithm
    Wang, Chundong
    Li, Zhiyuan
    Gong, Liangyi
    Mo, Xiuliang
    Yang, Hong
    Zhao, Yi
    [J]. ENTROPY, 2017, 19 (02):
  • [42] A Recurrent Neural Network-based Malicious Code Detection Technology
    Tang, Yongwang
    Liu, Xin
    Jin, Yanqing
    Wei, Han
    Deng, Qizheng
    [J]. PROCEEDINGS OF 2019 IEEE 8TH JOINT INTERNATIONAL INFORMATION TECHNOLOGY AND ARTIFICIAL INTELLIGENCE CONFERENCE (ITAIC 2019), 2019, : 1737 - 1742
  • [43] Malicious Code Detection Technology Based on A3C Algorithm
    Xue, Yi
    Shu, Hui
    Bu, Wenjuan
    Qu, Wu
    [J]. PROCEEDINGS OF 2020 IEEE 11TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2020), 2020, : 116 - 120
  • [44] Malicious Code Detection based on Image Processing Using Deep Learning
    Kumar, Rajesh
    Zhang Xiaosong
    Khan, Riaz Ullah
    Ahad, Ijaz
    Kumar, Jay
    [J]. PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON COMPUTING AND ARTIFICIAL INTELLIGENCE (ICCAI 2018), 2018, : 81 - 85
  • [45] Time and Location Power Based Malicious Code Detection Techniques for Smartphones
    Dixon, Bryan
    Mishra, Shivakant
    Pepin, Jeannette
    [J]. 2014 IEEE 13TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA 2014), 2014, : 261 - 268
  • [46] An Efficient Malicious Code Detection System Based on Convolutional Neural Networks
    Cao, Dongzhi
    Zhang, Xinglan
    Ning, Zhenhu
    Zhao, Jianfeng
    Xue, Fei
    Yang, Yongli
    [J]. PROCEEDINGS OF 2018 THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ARTIFICIAL INTELLIGENCE (CSAI 2018) / 2018 THE 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND MULTIMEDIA TECHNOLOGY (ICIMT 2018), 2018, : 86 - 89
  • [47] Malicious code detection based on CNNs and multi-objective algorithm
    Cui, Zhihua
    Du, Lei
    Wang, Penghong
    Cai, Xingjuan
    Zhang, Wensheng
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2019, 129 : 50 - 58
  • [48] Android malicious behavior recognition and classification method based on random forest algorithm
    Ke, Dong-Xiang
    Pan, Li-Min
    Luo, Sen-Lin
    Zhang, Han-Qing
    [J]. Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2019, 53 (10): : 2013 - 2023
  • [49] An integrated scheme for static voltage stability assessment based on correlation detection and random bits forest
    Liu, Songkai
    Shi, Ruoyuan
    Zhang, Tao
    Tang, Fei
    Zhang, Lei
    Liu, Lihuang
    Mao, Dan
    Li, Zhenhua
    Li, Xin
    Cheng, Jiangzhou
    Yan, Guanghui
    Liu, Lian
    Li, Dan
    Liao, Siyang
    Zhang, Menglin
    [J]. INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2021, 130
  • [50] Sentinel Based Malicious Relay Detection Scheme for Wireless IoT Networks
    Tandon, Anshoo
    Lim, Teng Joon
    Tefek, Utku
    [J]. 2018 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2018,