Lightweight Malicious Code Classification Method Based on Improved SqueezeNet

被引:0
|
作者
Li, Li [1 ]
Kong, Youran [1 ]
Zhang, Qing [1 ]
机构
[1] Northeast Forestry Univ, Sch Comp & Control Engn, Harbin 150040, Peoples R China
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2024年 / 78卷 / 01期
关键词
Lightweight neural network; malicious code classification; feature slicing; feature splicing; multi-size depthwise separable convolution;
D O I
10.32604/cmc.2023.045512
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the growth of the Internet, more and more business is being done online, for example, online offices, online education and so on. While this makes people's lives more convenient, it also increases the risk of the network being attacked by malicious code. Therefore, it is important to identify malicious codes on computer systems efficiently. However, most of the existing malicious code detection methods have two problems: (1) The ability of the model to extract features is weak, resulting in poor model performance. (2) The large scale of model data leads to difficulties deploying on devices with limited resources. Therefore, this paper proposes a lightweight malicious code identification model Lightweight Malicious Code Classification Method Based on Improved SqueezeNet (LCMISNet). In this paper, the MFire lightweight feature extraction module is constructed by proposing a feature slicing module and a multi -size depthwise separable convolution module. The feature slicing module reduces the number of parameters by grouping features. The multi -size depthwise separable convolution module reduces the number of parameters and enhances the feature extraction capability by replacing the standard convolution with depthwise separable convolution with different convolution kernel sizes. In addition, this paper also proposes a feature splicing module to connect the MFire lightweight feature extraction module based on the feature reuse and constructs the lightweight model LCMISNet. The malicious code recognition accuracy of LCMISNet on the BIG 2015 dataset and the Malimg dataset reaches 98.90% and 99.58%, respectively. It proves that LCMISNet has a powerful malicious code recognition performance. In addition, compared with other network models, LCMISNet has better performance, and a lower number of parameters and computations.
引用
收藏
页码:551 / 567
页数:17
相关论文
共 50 条
  • [21] Classification and Analysis of Malicious Code Detection Techniques Based on the APT Attack
    Lee, Kyungroul
    Lee, Jaehyuk
    Yim, Kangbin
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (05):
  • [22] Doc2vec-GRU: A Behavior Classification Method for Malicious Code
    Wang, Haiming
    Zhao, Yuntao
    Wang, Zijun
    [J]. International Journal of Network Security, 2024, 26 (03) : 467 - 476
  • [23] A Fast Malicious Code Detection Method Based on Feature Fusion
    Wang, Shuo
    Wang, Jian
    Wang, Ya-Nan
    Song, Ya-Fei
    [J]. Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2023, 51 (01): : 57 - 66
  • [24] Detection Method of WEB Malicious Code based on Link Analysis
    Lu Zhiyong
    Sui Sai
    Huang Chengdong
    Wang Xueyu
    [J]. 2016 INTERNATIONAL SYMPOSIUM ON COMPUTER, CONSUMER AND CONTROL (IS3C), 2016, : 511 - 514
  • [25] METHOD FOR DETECTING THE OBFUSCATED MALICIOUS CODE BASED ON BEHAVIOR CONNECTION
    Li, Wenwu
    Li, Chao
    Duan, Miyi
    [J]. 2014 IEEE 3RD INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (CCIS), 2014, : 234 - 240
  • [26] A Hybrid Malicious Code Detection Method based on Deep Learning
    Li, Yuancheng
    Ma, Rong
    Jiao, Runhai
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (05): : 205 - 215
  • [27] A method for efficient malicious code detection based on conceptual similarity
    Kim, Sungsuk
    Choi, Chang
    Choi, Junho
    Kim, Pankoo
    Kim, Hanil
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 4, 2006, 3983 : 567 - 576
  • [28] A Malicious Code Detection Method Based on Ensemble Learning of Behavior
    Xu, Xiao-Bo
    Zhang, Wen-Bo
    He, Chao
    Luo, Yi
    [J]. Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2019, 42 (04): : 89 - 95
  • [29] CNN- and GAN-based classification of malicious code families: A code visualization approach
    Wang, Ziyue
    Wang, Weizheng
    Yang, Yaoqi
    Han, Zhaoyang
    Xu, Dequan
    Su, Chunhua
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (12) : 12472 - 12489
  • [30] CodeBERT Based Code Classification Method
    Cheng, Siqiang
    Liu, Jianxun
    Peng, Zhenlian
    Cao, Ben
    [J]. Computer Engineering and Applications, 2023, 59 (24) : 277 - 288