Abstract
With the rapid development of Internet of things, cloud computing, edge computing and other technologies, malicious code attacks users and even enterprises more and more frequently with the help of software and system security vulnerabilities, which poses a serious threat to network security. The traditional static or dynamic malicious code detection technology is difficult to solve the problem of high-speed iteration and camouflage of malicious code. The detection method based on machine learning algorithm and data mining idea depends on manual feature extraction, and can not automatically and effectively extract the deeper features of malicious code. In view of the traditional malicious code detection methods and the related technologies of deep learning, this paper integrates deep learning into the dynamic malicious code detection system, and proposes a malicious code detection system based on convolutional neural network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Zhang, Y., Li, B.: Malicious code detection based on code semantic features. IEEE Access 8, 176728–176737 (2020)
Kang, B.B.H., Srivastava, A.: Dynamic malware analysis. In: van Tilborg, H.C.A., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security, pp. 367–368. Springer, Boston (2011). https://doi.org/10.1007/978-1-4419-5906-5_846
Zhang, B., Qianmua, L., Ma, Y.: Research on dynamic heuristic scanning technique and the application of the malicious code detection model. Inf. Process. Lett. 117(jan.), 19–24 (2017)
Sung, A.H., Xu, J., Chavez, P., et al.: Static analyzer of vicious executables (SAVE). In: 2004 20th Annual Computer Security Applications Conference. IEEE Computer Society (2005)
Han, L., Qian, M., Xu, X., et al.: Malicious code detection model based on behavior association. Tsinghua Sci. Technol. 19(5), 508–515 (2014)
Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. In: Advances in Neural Information Processing Systems, pp. 1097–1105 (2012)
Collobert, R., Weston, J., Bottou, L., et al.: Natural language processing (almost) from scratch. J. Mach. Learn. Res. 12(8), 2493–2537 (2011)
Chayal, N.M., Patel, N.P.: Review of machine learning and data mining methods to predict different cyberattacks. In: Kotecha, K., Piuri, V., Shah, H., Patel, R. (eds.) Data Science and Intelligent Applications. Lecture Notes on Data Engineering and Communications Technologies, vol. 52, pp. 43–51. Springer, Singapore (2021). https://doi.org/10.1007/978-981-15-4474-3_5
Yang, H., Li, S., Wu, X., et al.: A novel solutions for malicious code detection and family clustering based on machine learning. IEEE Access 7, 1 (2019)
Cui, Z., Xue, F., Cai, X., et al.: Detection of malicious code variants based on deep learning. IEEE Trans. Industr. Inform. 1 (2018)
Tahan, G., Glezer, C., Elovici, Y., Rokach, L.: Auto-Sign: an automatic signature generator for high-speed malware filtering devices. J. Comput. Virol. 6(2), 91–103 (2010)
Firdausi, I., Erwin, A., Nugroho, A.S.: Analysis of machine learning techniques used in behavior-based malware detection. In: 2010 Second International Conference on Advances in Computing, Control, and Telecommunication Technologies, pp. 201–203 (2010)
Burguera, I., Zurutuza, U., Nadjm-Tehrani, S.: Crowdroid: behavior-Based malware detection system for android. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 15–26 (2011)
Santos, I., Laorden, C., Bringas, P.G.: Collective classification for unknown malware detection. In: Proceedings of the International Conference on Security and Cryptography, pp. 251‐256 (2011)
Yang, Y., Yang, Z., Liu, X.: The algorithm of malicious code detection based on data mining. In: Green Energy and Sustainable Development I: Proceedings of the International Conference on Green Energy and Sustainable Development (GESD 2017) (2017)
Saxe, J., Berlin, K.: Deep neural network based malware detection using two dimensional binary program features. arXiv preprint arXiv:1508.03096 (2015)
Pascanu, R., Stokes, J.W., Sanossian, H., Marinescu, M., Thomas, A.: Malware classification with recurrent networks. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2015)
Acknowledgement
This research is supported by the National Natural Science Foundation of China (NO. 62173026).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Wu, Y., Zeng, J., Zhang, Z., Li, W., Zhang, Z., Zhang, Y. (2023). Design of Malicious Code Detection System Based on Convolutional Neural Network. In: Deng, DJ., Chao, HC., Chen, JC. (eds) Smart Grid and Internet of Things. SGIoT 2022. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 497. Springer, Cham. https://doi.org/10.1007/978-3-031-31275-5_12
Download citation
DOI: https://doi.org/10.1007/978-3-031-31275-5_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-31274-8
Online ISBN: 978-3-031-31275-5
eBook Packages: Computer ScienceComputer Science (R0)