[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3297156.3297246acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsaiConference Proceedingsconference-collections
research-article

An Efficient Malicious Code Detection System Based on Convolutional Neural Networks

Published: 08 December 2018 Publication History

Abstract

With the rapid development of the Internet, people have variety in their life style. While the Internet is developing rapidly, some malware has also been generated, and the number of malicious codes grows exponentially, which seriously affects the security of the Internet. In the prevention of malicious code, the accurate classification of malicious code is the most critical components. At present, researchers mainly focus on static detection and dynamic detection to study malicious code variant detection schemes. In the study of malicious code classification, this paper first analyzes the limitations of static detection and dynamic detection, then employs convolution neural networks to classify and identify malicious code, and finally implements an efficient malicious code detection system based on convolutional neural networks. Our malware detection model realizes the idea of automatic detection of malicious code variants. Experimental results demonstrated that the proposed malicious code detection system is efficient.

References

[1]
Zhihua Cui, Fei Xue, Xingjuan Cai, Yang Cao, Gai Ge Wang, and Jinjun Chen. 2018. Detection of Malicious Code Variants Based on Deep Learning. IEEE Transactions on Industrial Informatics 14, 7 (2018), 3187--3196.
[2]
Jianwen Fu, Jingfeng Xue, Yong Wang, Zhenyan Liu, and Chun Shan. 2018. Malware Visualization for Fine-Grained Classification. IEEE Access 6 (2018), 14510--14523.
[3]
Li Li, Daoyuan Li, Tegawendé F Bissyandé, Jacques Klein, Yves Le Traon, David Lo, and Lorenzo Cavallaro. 2017. Understanding android app piggybacking: A systematic study of malicious code grafting. IEEE Transactions on Information Forensics and Security 12, 6 (2017), 1269--1284.
[4]
Annamalai Narayanan, Mahinthan Chandramohan, Lihui Chen, and Yang Liu. 2017. A multi-view context-aware approach to Android malware detection and malicious code localization. Empirical Software Engineering (2017), 1--53.
[5]
Yong Qiao, Yuexiang Yang, Jie He, Chuan Tang, and Zhixue Liu. 2014. CBM: Free, Automatic Malware Analysis Framework Using API Call Sequences. Springer Berlin Heidelberg. 225--236.
[6]
Sathyanarayan, V Sai, Kohli, Pankaj and Bruhadeshwar, Bezawada. 2008. Signature Generation and Detection of Malware Families. In Information Security and Privacy. 336--349.
[7]
Carsten Willems, Thorsten Holz, and Felix Freiling. 2007. Toward Automated Dynamic Malware Analysis Using CWSandbox. IEEE Security & Privacy 5, 2 (2007), 32--39.
[8]
Mihai Christodorescu, Somesh Jha, Sanjit A Seshia, Dawn Song, and Randal E Bryant. 2005. Semantics-aware malware detection. In IEEE Symposium on Security and Privacy. 32--46.
[9]
Pengbin Feng, Jianfeng Ma, Cong Sun, Xinpeng Xu, and Yuwan Ma. 2018. A Novel Dynamic Android Malware Detection System With Ensemble Learning. IEEE Access 6 (2018), 30996--31011.
[10]
Nataraj, Lakshmanan and Karthikeyan, Sreejith and Jacob, Gregoire and Manjunath, BS. 2011. Malware images: visualization and automatic classification. In International Symposium on Visualization for Cyber Security. 1--7.
[11]
Lakshmanan Nataraj, Vinod Yegneswaran, Phillip Porras, and Jian Zhang. 2011. A comparative assessment of malware classification using binary texture analysis and dynamic analysis. In ACM Workshop on Security and Artificial Intelligence. 21--30.
[12]
Alex Krizhevsky, Ilya Sutskever, and Geoffrey E. Hinton. 2012. ImageNet classification with deep convolutional neural networks. In International Conference on Neural Information Processing Systems. 1097--1105.
[13]
Royi Ronen, Marian Radu, Corina Feuerstein, Elad Yom-Tov, and Mansour Ahmadi. 2018. Microsoft Malware Classification Challenge. arXiv preprint arXiv:1802.10135 (2018).

Cited By

View all
  • (2024)Ransomware Detection Model Based on Adaptive Graph Neural Network LearningApplied Sciences10.3390/app1411457914:11(4579)Online publication date: 27-May-2024
  • (2023)Real-Time Ransomware Detection Method Based on TextGCN2023 6th International Conference on Artificial Intelligence and Big Data (ICAIBD)10.1109/ICAIBD57115.2023.10206378(535-541)Online publication date: 26-May-2023
  • (2022)An Effective Data Balancing Strategy Based on Swarm Intelligence Algorithm for Malicious Code Detection and ClassificationBio-Inspired Computing: Theories and Applications10.1007/978-981-19-1256-6_12(160-173)Online publication date: 24-Mar-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
CSAI '18: Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence
December 2018
641 pages
ISBN:9781450366069
DOI:10.1145/3297156
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • Shenzhen University: Shenzhen University

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 December 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Convolutional neural networks
  2. Deep learning
  3. Malicious code detection system

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

CSAI '18

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)1
Reflects downloads up to 11 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Ransomware Detection Model Based on Adaptive Graph Neural Network LearningApplied Sciences10.3390/app1411457914:11(4579)Online publication date: 27-May-2024
  • (2023)Real-Time Ransomware Detection Method Based on TextGCN2023 6th International Conference on Artificial Intelligence and Big Data (ICAIBD)10.1109/ICAIBD57115.2023.10206378(535-541)Online publication date: 26-May-2023
  • (2022)An Effective Data Balancing Strategy Based on Swarm Intelligence Algorithm for Malicious Code Detection and ClassificationBio-Inspired Computing: Theories and Applications10.1007/978-981-19-1256-6_12(160-173)Online publication date: 24-Mar-2022
  • (2021)Fine-grained Classification of Malicious Code Based on CNN and Multi-resolution Feature Fusion2021 6th International Conference on Computational Intelligence and Applications (ICCIA)10.1109/ICCIA52886.2021.00031(123-127)Online publication date: Jun-2021
  • (2021)A Review of Computer Vision Methods in Network SecurityIEEE Communications Surveys & Tutorials10.1109/COMST.2021.308647523:3(1838-1878)Online publication date: Nov-2022

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media