Lightweight Malicious Code Classification Method Based on Improved SqueezeNet

被引:0
|
作者
Li, Li [1 ]
Kong, Youran [1 ]
Zhang, Qing [1 ]
机构
[1] Northeast Forestry Univ, Sch Comp & Control Engn, Harbin 150040, Peoples R China
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2024年 / 78卷 / 01期
关键词
Lightweight neural network; malicious code classification; feature slicing; feature splicing; multi-size depthwise separable convolution;
D O I
10.32604/cmc.2023.045512
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the growth of the Internet, more and more business is being done online, for example, online offices, online education and so on. While this makes people's lives more convenient, it also increases the risk of the network being attacked by malicious code. Therefore, it is important to identify malicious codes on computer systems efficiently. However, most of the existing malicious code detection methods have two problems: (1) The ability of the model to extract features is weak, resulting in poor model performance. (2) The large scale of model data leads to difficulties deploying on devices with limited resources. Therefore, this paper proposes a lightweight malicious code identification model Lightweight Malicious Code Classification Method Based on Improved SqueezeNet (LCMISNet). In this paper, the MFire lightweight feature extraction module is constructed by proposing a feature slicing module and a multi -size depthwise separable convolution module. The feature slicing module reduces the number of parameters by grouping features. The multi -size depthwise separable convolution module reduces the number of parameters and enhances the feature extraction capability by replacing the standard convolution with depthwise separable convolution with different convolution kernel sizes. In addition, this paper also proposes a feature splicing module to connect the MFire lightweight feature extraction module based on the feature reuse and constructs the lightweight model LCMISNet. The malicious code recognition accuracy of LCMISNet on the BIG 2015 dataset and the Malimg dataset reaches 98.90% and 99.58%, respectively. It proves that LCMISNet has a powerful malicious code recognition performance. In addition, compared with other network models, LCMISNet has better performance, and a lower number of parameters and computations.
引用
收藏
页码:551 / 567
页数:17
相关论文
共 50 条
  • [31] Malicious URL Classification Model Based on Improved Sparrow Search Algorithm
    Ma, Yiran
    Guan, Qihang
    Guo, Fengyuan
    Zhang, Guidong
    [J]. PROCEEDINGS OF 2021 IEEE 11TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC 2021), 2021, : 21 - 25
  • [32] Malicious behaviour classification in web logs based on an improved Xgboost algorithm
    Song, Jiaming
    Wang, Xiaojuan
    Jin, Lei
    You, Jingwen
    [J]. International Journal of Web Engineering and Technology, 2018, 13 (04) : 334 - 362
  • [33] Method for Generating Malicious Code Adversarial Samples Based on Genetic Algorithm
    Yan Jia
    Nie Chujiang
    Su Purui
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (09) : 2126 - 2133
  • [34] Research of Malicious Code Attack Effect Based on Synthetic Entropy Method
    Li Peng
    Wang Ruchuan
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2013, 22 (03) : 449 - 454
  • [35] Method for Generating Malicious Code Adversarial Samples Based on Genetic Algorithm
    Yan, Jia
    Yan, Jia
    Nie, Chujiang
    Su, Purui
    [J]. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2020, 42 (09): : 2126 - 2133
  • [36] Deep Learning and Regularization Algorithms for Malicious Code Classification
    Wang, Haojun
    Long, Haixia
    Wang, Ailan
    Liu, Tianyue
    Fu, Haiyan
    [J]. IEEE ACCESS, 2021, 9 : 91512 - 91523
  • [37] A Lightweight Crop Pest Classification Method Based on Improved MobileNet-V2 Model
    Peng, Hongxing
    Xu, Huiming
    Shen, Guanjia
    Liu, Huanai
    Guan, Xianlu
    Li, Minhui
    [J]. AGRONOMY-BASEL, 2024, 14 (06):
  • [38] Malicious Code Detection Based on Code Semantic Features
    Zhang, Yu
    Li, Binglong
    [J]. IEEE ACCESS, 2020, 8 : 176728 - 176737
  • [39] Towards Automatic and Lightweight Detection and Classification of Malicious Web Contents
    Mohaisen, Aziz
    [J]. 2015 THIRD IEEE WORKSHOP ON HOT TOPICS IN WEB SYSTEMS AND TECHNOLOGIES (HOTWEB), 2015, : 67 - 72
  • [40] A Malicious Mining Code Detection Method Based on Multi-Features Fusion
    Li, Shudong
    Jiang, Laiyuan
    Zhang, Qianqing
    Wang, Zhen
    Tian, Zhihong
    Guizani, Mohsen
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2023, 10 (05): : 2731 - 2739