A Hybrid Malicious Code Detection Method based on Deep Learning

被引:133
作者
Li, Yuancheng [1 ]
Ma, Rong [1 ]
Jiao, Runhai [1 ]
机构
[1] North China Elect Power Univ, Sch Control & Comp Engn, Beijing, Peoples R China
来源
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS | 2015年 / 9卷 / 05期
关键词
Malicious code Detection; AutoEncoder; DBN RBM; deep learning;
D O I
10.14257/ijsia.2015.9.5.21
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper; we propose a hybrid malicious code detection scheme based on AutoEncoder and DBN (Deep Belief Networks). Firstly, we use the AutoEncoder deep learning method to reduce the dimensionality of data. This could convert complicated high-dimensional data into low dimensional codes with the nonlinear mapping, thereby reducing the dimensionality of data, extracting the main features of the data; then using DBN learning method to detect malicious code. DBN is composed of multilayer Restricted Boltzmann Machines (RBM, Restricted Boltzmann Machine) and a layer of BP neural network. Based on unsupervised training of every layer of RBM, we make the output vector of the last layer of RBM as the input vectors of BP neural network, then conduct supervised training to the BP neural network, finally achieve the optimal hybrid model by fine-tuning the entire network. After inputting testing samples into the hybrid model, the experimental results show that the detection accuracy getting by the hybrid detection method proposed in this paper is higher than that of single DBN. The proposed method reduces the time complexity and has better detection performance.
引用
收藏
页码:205 / 215
页数:11
相关论文
共 15 条
[1]  
CHRISTODORESCU M, 2005, P 2005 IEEE S SEC PR
[2]  
Christodorescu M., 2006, TECHNICAL REPORT
[3]  
Ding Y. X., 2011, J COMPUTERS SECURITY, V30
[4]  
Hinton G. E., 2006, J SCI, V313
[5]  
Hinton Geoffrey E., 1984, DISTRIBUTED REPRESEN
[6]  
Idika Nwokedi C., 2007, TECHNICAL REPORT
[7]  
Kong D. G, 2011, J J SOFTWARE, V22
[8]  
Lin P. C., 2008, J COMPUTER PRACTICES, V41
[9]  
Milenkovic M., 2005, J ACM SIGARCH COMPUT, V33
[10]  
Sawaya Y, 2011, IEEE IPSJ 11 INT S J