4.8 Article

Detection of Malicious Code Variants Based on Deep Learning

期刊

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
卷 14, 期 7, 页码 3187-3196

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TII.2018.2822680

关键词

Malware variants; grayscale image; deep learning; convolution neural network; bat algorithm

资金

  1. National Natural Science Foundation of China [61003053, 61403271]
  2. Natural Science Foundation of Shanxi Province [201601D011045]

向作者/读者索取更多资源

With the development of the Internet, malicious code attacks have increased exponentially, with malicious code variants ranking as a key threat to Internet security. The ability to detect variants of malicious code is critical for protection against security breaches, data theft, and other dangers. Current methods for recognizing malicious code have demonstrated poor detection accuracy and low detection speeds. This paper proposed a novel method that used deep learning to improve the detection of malware variants. In prior research, deep learning demonstrated excellent performance in image recognition. To implement our proposed detection method, we converted the malicious code into grayscale images. Then, the images were identified and classified using a convolutional neural network (CNN) that could extract the features of the malware images automatically. In addition, we utilized a bat algorithm to address the data imbalance among different malware families. To test our approach, we conducted a series of experiments on malware image data from Vision Research Lab. The experimental results demonstrated that our model achieved good accuracy and speed as compared with other malware detection models.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Interdisciplinary Applications

Elephant herding optimization using dynamic topology and biogeography-based optimization based on learning for numerical optimization

Wei Li, Gai-Ge Wang

Summary: EHO and BBO are two intelligent algorithms that proposed the BLEHO algorithm by interconnecting and learning based on biogeography. The algorithm dynamically changes the topological structure of the elephant population, uses different update and separation operators, and preserves a certain number of individuals through an elitism strategy to ensure better evolutionary process.

ENGINEERING WITH COMPUTERS (2022)

Article Computer Science, Information Systems

A Numerical Splitting and Adaptive Privacy Budget-Allocation-Based LDP Mechanism for Privacy Preservation in Blockchain-Powered IoT

Kai Zhang, Jiao Tian, Hongwang Xiao, Ying Zhao, Wenyu Zhao, Jinjun Chen

Summary: Blockchain has attracted attention from the IoT research community due to its decentralization and consistency. However, the accessibility of all nodes to the chain data raises privacy concerns. To address this issue, we propose a novel LDP mechanism that splits and perturbs input numerical data using digital bits, without requiring a fixed input range and large data volume. Our adaptive privacy budget allocation model significantly reduces the deviation of the perturbation function and provides high data utility while maintaining privacy.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Artificial Intelligence

Improved NSGA-III using transfer learning and centroid distance for dynamic multi-objective optimization

Haijuan Zhang, Gai-Ge Wang

Summary: This paper proposes a TC_NSGAIII algorithm that combines centroid distance and transfer learning to solve the challenging problem of finding the changing Pareto front quickly and accurately in dynamic multi-objective optimization problems. Experimental results demonstrate the effectiveness of the proposed algorithm, showing significant improvement in performance.

COMPLEX & INTELLIGENT SYSTEMS (2023)

Article Computer Science, Software Engineering

The global evaluation strategy for many-objective partial collaborative computation offloading problem

Zhaoyu Xue, Wanwan Guo, Zhihua Cui, Wensheng Zhang

Summary: This paper proposes a collaborative computation-offloading model to solve the problem of limited resources in user terminals in the Internet of Things. By offloading tasks and using a global evaluation strategy, the model aims to optimize model execution time, task execution time, energy consumption, and device workload.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2023)

Article Computer Science, Software Engineering

A novel multi-objective immune optimization algorithm for under sampling software defect prediction problem

Tao Ye, Wenting Li, Jiangjiang Zhang, Zhihua Cui

Summary: This study introduces a multi-objective software defect prediction model and an immune optimization algorithm to address the challenges of data imbalance and parameter selection in software defect prediction. By optimizing the defect detection rate and defect false alarm rate, better prediction results are achieved.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2023)

Article Automation & Control Systems

A Many-Objective Optimization Based Federal Deep Generation Model for Enhancing Data Processing Capability in IoT

Xingjuan Cai, Yang Lan, Zhixia Zhang, Jie Wen, Zhihua Cui, Wensheng Zhang

Summary: In this article, a skin cancer detection model based on federated learning integrated with deep generation model is proposed to address the problem of data insufficiency and data source privacy in healthcare IoT. The model utilizes dual generative adversarial networks and knee point-driven evolutionary algorithm to improve the quality of generated images and protect patient information privacy. Experimental results show high accuracy and area under the curve for the proposed model.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2023)

Article Computer Science, Software Engineering

A many-objective optimization based intelligent algorithm for virtual machine migration in mobile edge computing

Tian Fan, Wanwan Guo, Zhixia Zhang, Zhihua Cui

Summary: With the rapid development of big data, the growth of data promotes the progress of the Internet of Things (IoT). To solve the instability of MEC performance and the conflict of interest between users and service providers, the paper proposes a virtual machine migration model based on many-objective optimization. The results of simulations show the effectiveness and superiority of the proposed approach compared to other algorithms.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2023)

Article Computer Science, Software Engineering

A many-objective optimization algorithm with dual criteria and mixed distribution correction strategy

Zhixia Zhang, Jie Wen, Xingjuan Cai, Zhihua Cui

Summary: This paper proposes a many-objective optimization algorithm based on dual criteria and mixed distribution correction strategy. The algorithm addresses challenges faced by existing algorithms, such as domination resistance and dimensional crisis, and achieves significant advantages in maintaining the convergence and diversity of the population.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2023)

Article Computer Science, Artificial Intelligence

A multi-objective sequential three-way decision approach for real-time malware detection

Zhuoxuan Lan, Binquan Zhang, Jie Wen, Zhihua Cui, Xiao-Zhi Gao

Summary: This paper proposes a malicious code detection model based on sequential three-way decision to solve the problem that traditional two-way decision based methods fail to consider the influence of decision making under the condition of insufficient information in dynamic environments with complex and massive data. The model introduces sequential three-way decision into the domain of malicious code to avoid the risk of possible error detection due to insufficient information. Furthermore, a multi-objective sequential three-way decision model is designed to improve the overall performance of the detection model and eliminate the subjectivity of threshold selection. The simulation results show that the model guarantees detection performance and improves decision efficiency effectively, fitting better in real dynamic detection environments.

APPLIED INTELLIGENCE (2023)

Article Computer Science, Software Engineering

Federated malware detection based on many-objective optimization in cross-architectural IoT

Zhigang Zhang, Zhixia Zhang, Zhihua Cui

Summary: With the increasing adoption of IoT, malware targeting vulnerable IoT devices has become a major concern. This study proposes a novel federated malware detection framework based on many-objective optimization (FMDMO) to address the challenges in malware hunting in IoT. It provides a cross-platform compatible basis with privacy protection and enhances training efficiency while maintaining cross-architectural generalization.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2023)

Article Computer Science, Information Systems

Anomaly Detection in Blockchain Networks: A Comprehensive Survey

Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen

Summary: Over the past decade, blockchain technology has gained significant attention due to its integration with various everyday applications of modern information and communication technologies (ICT). The peer-to-peer (P2P) architecture of blockchain enhances these applications by providing strong security and trust-oriented guarantees. However, recent research has shown that blockchain networks may still face security, privacy, and reliability issues. In this article, we provide a comprehensive survey on the integration of anomaly detection models in blockchain technology. We discuss the role of anomaly detection in ensuring security, present evaluation metrics and requirements, survey various models, and highlight future research directions.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2023)

Article Computer Science, Artificial Intelligence

Geo-Ellipse-Indistinguishability: Community-Aware Location Privacy Protection for Directional Distribution

Ying Zhao, Dong Yuan, Jia Tina Du, Jinjun Chen

Summary: Directional distribution analysis is essential for abstracting dispersion and orientation of spatial datasets, but it must be used cautiously to protect individuals' privacy. There is a tension between accurate directional distribution results and location privacy. In this paper, we propose a geo-ellipse-indistinguishability privacy notion to protect individual location data and present elliptical privacy mechanisms based on gamma distribution and multivariate normal distribution. The empirical evaluation shows that our proposed elliptical approach achieves significantly higher directional distribution utility compared to circular noise function based methods.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2023)

Article Computer Science, Cybernetics

A Knowledge Graph-Based Many-Objective Model for Explainable Social Recommendation

Xingjuan Cai, Wanwan Guo, Mengkai Zhao, Zhihua Cui, Jinjun Chen

Summary: This article proposes a knowledge graph-based many-objective model for explainable social recommendation (KGMESR), which considers the explainability, accuracy, novelty, and content quality of social recommendation results. The model utilizes social behavior information to calculate user similarity and quantifies the explainability of results using entity vectors and embedding vectors. A many-objective recommendation algorithm based on the partition deletion strategy is designed for efficiency. Experimental results demonstrate preferable recommendation results and two case studies affirm the explainability of the proposed model.

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2023)

Article Engineering, Multidisciplinary

Strengthened Initialization of Adaptive Cross-Generation Differential Evolution

Wei Wan, Gaige Wang, Junyu Dong

Summary: The study introduces an enhanced version of the Adaptive Cross-Generation Differential Evolution algorithm called SIACGDE, which improves algorithm performance by strengthening the initialization strategy and optimizing parameters. Experimental results show that the algorithm outperforms others in terms of diversity and convergence.

CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES (2022)

暂无数据