Malicious mining code detection based on ensemble learning in cloud computing environment

被引:39
作者
Li, Shudong [1 ]
Li, Yuan [1 ]
Han, Weihong [1 ]
Du, Xiaojiang [2 ]
Guizani, Mohsen [3 ]
Tian, Zhihong [1 ]
机构
[1] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou 510006, Peoples R China
[2] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
[3] Qatar Univ, Comp Sci & Engn Dept, Doha, Qatar
关键词
Malicious mining code; Mining virus; Cloud computing; Static analysis; Ensemble learning; MALWARE;
D O I
10.1016/j.simpat.2021.102391
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Hackers increasingly tend to abuse and nefariously use cloud services by injecting malicious mining code. This malicious code can be spread through infrastructures in the cloud platforms and pose a great threat to users and enterprises. In this study, a method is proposed for detecting malicious mining code in the cloud platforms, which constructs a detection model by fusing the Bagging and Boosting algorithms. By randomly extracting samples and letting models vote together to decide, the variance of model detection can be reduced obviously. Compared with traditional classifiers, the proposed method can obtain higher accuracy and better robustness. The experimental results show that, for the given dataset, the values of AUC and F1-score can reach 0.992 and 0.987 respectively, and the standard deviation of AUC values under different data inputs is only 0.0009.
引用
收藏
页数:12
相关论文
共 31 条
[1]   Deep recurrent neural network for IoT intrusion detection system [J].
Almiani, Muder ;
AbuGhazleh, Alia ;
Al-Rahayfeh, Amer ;
Atiewi, Saleh ;
Razaque, Abdul .
SIMULATION MODELLING PRACTICE AND THEORY, 2020, 101
[2]   Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection [J].
Chen, Xiao ;
Li, Chaoran ;
Wang, Derui ;
Wen, Sheng ;
Zhang, Jun ;
Nepal, Surya ;
Xiang, Yang ;
Ren, Kui .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 :987-1001
[3]  
Duan YH, 2015, IEEE ICC, P5691, DOI 10.1109/ICC.2015.7249229
[4]  
Gao J., 2020, COMPUT ENG APPL
[5]  
Huber P. J, 2004, ROBUST STAT, V523
[6]   A weighted network community detection algorithm based on deep learning [J].
Li, Shudong ;
Jiang, Laiyuan ;
Wu, Xiaobo ;
Han, Weihong ;
Zhao, Dawei ;
Wang, Zhen .
APPLIED MATHEMATICS AND COMPUTATION, 2021, 401
[7]   Functional immunization of networks based on message passing [J].
Li, Shudong ;
Zhao, Dawei ;
Wu, Xiaobo ;
Tian, Zhihong ;
Li, Aiping ;
Wang, Zhen .
APPLIED MATHEMATICS AND COMPUTATION, 2020, 366
[8]   Software Vulnerability Detection Using Deep Neural Networks: A Survey [J].
Lin, Guanjun ;
Wen, Sheng ;
Han, Qing-Long ;
Zhang, Jun ;
Xiang, Yang .
PROCEEDINGS OF THE IEEE, 2020, 108 (10) :1825-1848
[9]   A Novel Web Attack Detection System for Internet of Things via Ensemble Classification [J].
Luo, Chaochao ;
Tan, Zhiyuan ;
Min, Geyong ;
Gan, Jie ;
Shi, Wei ;
Tian, Zhihong .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (08) :5810-5818
[10]   Model checking and machine learning techniques for HummingBad mobile malware detection and mitigation [J].
Martinelli, Fabio ;
Mercaldo, Francesco ;
Nardone, Vittoria ;
Santone, Antonella ;
Vaglini, Gigliola .
SIMULATION MODELLING PRACTICE AND THEORY, 2020, 105