A Hybrid Malicious Code Detection Method based on Deep Learning
Yuancheng Li,Rong Ma,Runhai Jiao +2 more
Reads0
Chats0
TLDR
The experimental results show that the detection accuracy getting by the hybrid detection method proposed in this paper is higher than that of single DBN and has better detection performance.Abstract:
In this paper, we propose a hybrid malicious code detection scheme based on AutoEncoder and DBN (Deep Belief Networks). Firstly, we use the AutoEncoder deep learning method to reduce the dimensionality of data. This could convert complicated high-dimensional data into low dimensional codes with the nonlinear mapping, thereby reducing the dimensionality of data, extracting the main features of the data; then using DBN learning method to detect malicious code. DBN is composed of multilayer Restricted Boltzmann Machines (RBM, Restricted Boltzmann Machine) and a layer of BP neural network. Based on unsupervised training of every layer of RBM, we make the output vector of the last layer of RBM as the input vectors of BP neural network, then conduct supervised training to the BP neural network, finally achieve the optimal hybrid model by fine-tuning the entire network. After inputting testing samples into the hybrid model, the experimental results show that the detection accuracy getting by the hybrid detection method proposed in this paper is higher than that of single DBN. The proposed method reduces the time complexity and has better detection performance.read more
Citations
More filters
Journal ArticleDOI
A comprehensive survey on machine learning for networking: evolution, applications and research opportunities
Raouf Boutaba,Mohammad A. Salahuddin,Noura Limam,Sara Ayoubi,Nashid Shahriar,Felipe Estrada-Solano,Felipe Estrada-Solano,Oscar Mauricio Caicedo +7 more
TL;DR: This survey delineates the limitations, give insights, research challenges and future opportunities to advance ML in networking, and jointly presents the application of diverse ML techniques in various key areas of networking across different network technologies.
Journal ArticleDOI
State-of-the-Art Deep Learning: Evolving Machine Intelligence Toward Tomorrow’s Intelligent Network Traffic Control Systems
Zubair Md. Fadlullah,Fengxiao Tang,Bomin Mao,Nei Kato,Osamu Akashi,Takeru Inoue,Kimihiro Mizutani +6 more
TL;DR: An overview of the state-of-the-art deep learning architectures and algorithms relevant to the network traffic control systems, and a new use case, i.e., deep learning based intelligent routing, which is demonstrated to be effective in contrast with the conventional routing strategy.
Journal ArticleDOI
Distributed attack detection scheme using deep learning approach for Internet of Things
TL;DR: The experiments have shown that the distributed attack detection system is superior to centralized detection systems using deep learning model, and it has been demonstrated that the deep model is more effective in attack detection than its shallow counter parts.
Journal ArticleDOI
A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
TL;DR: A comprehensive survey of ML methods and recent advances in DL methods that can be used to develop enhanced security methods for IoT systems and presents the opportunities, advantages and shortcomings of each method.
Journal ArticleDOI
A survey of deep learning-based network anomaly detection
TL;DR: An overview of deep learning methodologies, including restricted Bolzmann machine-based deep belief network, deep neural network, and recurrent neuralnetwork, as well as the machine learning techniques relevant to network anomaly detection are presented.
References
More filters
Book
Distributed representations
TL;DR: This report describes a different type of representation that is less familiar and harder to think about than local representations, which makes use of the processing abilities of networks of simple, neuron-like computing elements.
ReportDOI
Static analysis of executables to detect malicious patterns
Mihai Christodorescu,Somesh Jha +1 more
TL;DR: An architecture for detecting malicious patterns in executables that is resilient to common obfuscation transformations is presented, and experimental results demonstrate the efficacy of the prototype tool, SAFE (a static analyzer for executables).
A Survey of Malware Detection Techniques
TL;DR: This paper presents a meta-modelling system that automates and automates the very labor-intensive and therefore time-heavy and expensive and expensive process of manually cataloging and annotating Malware.
Proceedings ArticleDOI
Detection of Attackers in Services Using Anomalous Host Behavior Based on Traffic Flow Statistics
TL;DR: A new flow-based attacker detection method that achieves a high detection rate using traffic flow statistics obtained by Net Flow, sFlow, etc, and accurately identifies hosts sending flows to object port as attackers, without any deep packet inspection.
Proceedings ArticleDOI
Intrusive behavior analysis based on honey pot tracking and ant algorithm analysis
TL;DR: A novel intrusion behavior analysis mechanism based on the design of honey pot and the diagnosis of ant colony algorithm and good efficiency and performance is proposed.
Related Papers (5)
A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
Anna L. Buczak,Erhan Guven +1 more