Lightweight Malicious Code Classification Method Based on Improved SqueezeNet

被引:0
|
作者
Li, Li [1 ]
Kong, Youran [1 ]
Zhang, Qing [1 ]
机构
[1] Northeast Forestry Univ, Sch Comp & Control Engn, Harbin 150040, Peoples R China
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2024年 / 78卷 / 01期
关键词
Lightweight neural network; malicious code classification; feature slicing; feature splicing; multi-size depthwise separable convolution;
D O I
10.32604/cmc.2023.045512
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the growth of the Internet, more and more business is being done online, for example, online offices, online education and so on. While this makes people's lives more convenient, it also increases the risk of the network being attacked by malicious code. Therefore, it is important to identify malicious codes on computer systems efficiently. However, most of the existing malicious code detection methods have two problems: (1) The ability of the model to extract features is weak, resulting in poor model performance. (2) The large scale of model data leads to difficulties deploying on devices with limited resources. Therefore, this paper proposes a lightweight malicious code identification model Lightweight Malicious Code Classification Method Based on Improved SqueezeNet (LCMISNet). In this paper, the MFire lightweight feature extraction module is constructed by proposing a feature slicing module and a multi -size depthwise separable convolution module. The feature slicing module reduces the number of parameters by grouping features. The multi -size depthwise separable convolution module reduces the number of parameters and enhances the feature extraction capability by replacing the standard convolution with depthwise separable convolution with different convolution kernel sizes. In addition, this paper also proposes a feature splicing module to connect the MFire lightweight feature extraction module based on the feature reuse and constructs the lightweight model LCMISNet. The malicious code recognition accuracy of LCMISNet on the BIG 2015 dataset and the Malimg dataset reaches 98.90% and 99.58%, respectively. It proves that LCMISNet has a powerful malicious code recognition performance. In addition, compared with other network models, LCMISNet has better performance, and a lower number of parameters and computations.
引用
收藏
页码:551 / 567
页数:17
相关论文
共 50 条
  • [1] Malicious Code Classification Method Based on Deep Forest
    Lu, Xi-Dong
    Duan, Zhe-Min
    Qian, Ye-Kui
    Zhou, Wei
    [J]. Ruan Jian Xue Bao/Journal of Software, 2020, 31 (05): : 1454 - 1464
  • [2] Improved capsule networks based on Nash equilibrium for malicious code classification
    Wang, Meng
    Zhang, Yahao
    Wen, Weiping
    [J]. COMPUTERS & SECURITY, 2024, 136
  • [3] Malicious Code Family Classification Method Based on Vision Transformer
    Chen, Shi
    Liu, Ying
    Hu, Wei
    Liu, Jianyi
    Gao, Yating
    Lin, Bingjie
    [J]. 2022 IEEE 10TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION AND NETWORKS (ICICN 2022), 2022, : 704 - 709
  • [4] A Lightweight Model for Malicious Code Classification Based on Structural Reparameterisation and Large Convolutional Kernels
    Li, Sicong
    Wang, Jian
    Song, Yafei
    Wang, Shuo
    Wang, Yanan
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2024, 17 (01)
  • [5] A Lightweight Model for Malicious Code Classification Based on Structural Reparameterisation and Large Convolutional Kernels
    Sicong Li
    Jian Wang
    Yafei Song
    Shuo Wang
    Yanan Wang
    [J]. International Journal of Computational Intelligence Systems, 17
  • [6] Tri-channel visualised malicious code classification based on improved ResNet
    Li, Sicong
    Wang, Jian
    Song, Yafei
    Wang, Shuo
    [J]. APPLIED INTELLIGENCE, 2024, 54 (23) : 12453 - 12475
  • [7] An Android Malicious Code Detection Method Based on Improved DCA Algorithm
    Wang, Chundong
    Li, Zhiyuan
    Gong, Liangyi
    Mo, Xiuliang
    Yang, Hong
    Zhao, Yi
    [J]. ENTROPY, 2017, 19 (02):
  • [8] Classification Method of Multi-variety Tea Leaves Based on Improved SqueezeNet Model
    Sun, Daozong
    Ding, Zheng
    Liu, Jinyuan
    Liu, Huan
    Xie, Jiaxine
    Wang, Weixing
    [J]. Nongye Jixie Xuebao/Transactions of the Chinese Society for Agricultural Machinery, 2023, 54 (02): : 223 - 230
  • [9] Decompiled APK based malicious code classification
    Mateless, Roni
    Rejabek, Daniel
    Margalit, Oded
    Moskovitch, Robert
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 110 : 135 - 147
  • [10] Improved Malicious Code Classification Considering Sequence by Machine Learning
    Paik, Incheon
    [J]. 18TH IEEE INTERNATIONAL SYMPOSIUM ON CONSUMER ELECTRONICS (ISCE 2014), 2014,