scispace - formally typeset
Open AccessJournal ArticleDOI

A Hybrid Malicious Code Detection Method based on Deep Learning

Yuancheng Li, +2 more
- 31 May 2015 - 
- Vol. 9, Iss: 5, pp 205-216
Reads0
Chats0
TLDR
The experimental results show that the detection accuracy getting by the hybrid detection method proposed in this paper is higher than that of single DBN and has better detection performance.
Abstract
In this paper, we propose a hybrid malicious code detection scheme based on AutoEncoder and DBN (Deep Belief Networks). Firstly, we use the AutoEncoder deep learning method to reduce the dimensionality of data. This could convert complicated high-dimensional data into low dimensional codes with the nonlinear mapping, thereby reducing the dimensionality of data, extracting the main features of the data; then using DBN learning method to detect malicious code. DBN is composed of multilayer Restricted Boltzmann Machines (RBM, Restricted Boltzmann Machine) and a layer of BP neural network. Based on unsupervised training of every layer of RBM, we make the output vector of the last layer of RBM as the input vectors of BP neural network, then conduct supervised training to the BP neural network, finally achieve the optimal hybrid model by fine-tuning the entire network. After inputting testing samples into the hybrid model, the experimental results show that the detection accuracy getting by the hybrid detection method proposed in this paper is higher than that of single DBN. The proposed method reduces the time complexity and has better detection performance.

read more

Citations
More filters
Journal ArticleDOI

A comprehensive survey on machine learning for networking: evolution, applications and research opportunities

TL;DR: This survey delineates the limitations, give insights, research challenges and future opportunities to advance ML in networking, and jointly presents the application of diverse ML techniques in various key areas of networking across different network technologies.
Journal ArticleDOI

State-of-the-Art Deep Learning: Evolving Machine Intelligence Toward Tomorrow’s Intelligent Network Traffic Control Systems

TL;DR: An overview of the state-of-the-art deep learning architectures and algorithms relevant to the network traffic control systems, and a new use case, i.e., deep learning based intelligent routing, which is demonstrated to be effective in contrast with the conventional routing strategy.
Journal ArticleDOI

Distributed attack detection scheme using deep learning approach for Internet of Things

TL;DR: The experiments have shown that the distributed attack detection system is superior to centralized detection systems using deep learning model, and it has been demonstrated that the deep model is more effective in attack detection than its shallow counter parts.
Journal ArticleDOI

A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security

TL;DR: A comprehensive survey of ML methods and recent advances in DL methods that can be used to develop enhanced security methods for IoT systems and presents the opportunities, advantages and shortcomings of each method.
Journal ArticleDOI

A survey of deep learning-based network anomaly detection

TL;DR: An overview of deep learning methodologies, including restricted Bolzmann machine-based deep belief network, deep neural network, and recurrent neuralnetwork, as well as the machine learning techniques relevant to network anomaly detection are presented.
References
More filters
Book

Distributed representations

TL;DR: This report describes a different type of representation that is less familiar and harder to think about than local representations, which makes use of the processing abilities of networks of simple, neuron-like computing elements.
ReportDOI

Static analysis of executables to detect malicious patterns

TL;DR: An architecture for detecting malicious patterns in executables that is resilient to common obfuscation transformations is presented, and experimental results demonstrate the efficacy of the prototype tool, SAFE (a static analyzer for executables).

A Survey of Malware Detection Techniques

TL;DR: This paper presents a meta-modelling system that automates and automates the very labor-intensive and therefore time-heavy and expensive and expensive process of manually cataloging and annotating Malware.
Proceedings ArticleDOI

Detection of Attackers in Services Using Anomalous Host Behavior Based on Traffic Flow Statistics

TL;DR: A new flow-based attacker detection method that achieves a high detection rate using traffic flow statistics obtained by Net Flow, sFlow, etc, and accurately identifies hosts sending flows to object port as attackers, without any deep packet inspection.
Proceedings ArticleDOI

Intrusive behavior analysis based on honey pot tracking and ant algorithm analysis

TL;DR: A novel intrusion behavior analysis mechanism based on the design of honey pot and the diagnosis of ant colony algorithm and good efficiency and performance is proposed.
Related Papers (5)