Feature fusion-based malicious code detection with dual attention mechanism and BiLSTM

被引:17
作者
Shen, Gaoning [1 ,2 ]
Chen, Zhixiang [3 ]
Wang, Hui
Chen, Heng [1 ,2 ]
Wang, Shuqi [1 ,2 ]
机构
[1] Minnan Normal Univ, Coll Comp, Zhangzhou, Fujian, Peoples R China
[2] Minnan Normal Univ, Key Lab Data Sci & Intelligence Applicat, Zhangzhou, Fujian, Peoples R China
[3] Minnan Normal Univ, Coll Phys & Informat Engn, Zhangzhou, Fujian, Peoples R China
基金
中国国家自然科学基金;
关键词
Malicious code; Feature fusion; Attention mechanism; Grayscale images; Bi-directional Long Short-Term Memory;
D O I
10.1016/j.cose.2022.102761
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malicious code has become an important factor threatening network security. Single feature-based malicious code detection methods have achieved good detection results, but when faced with some similar malicious code families, the detection effect is often poor. To address this concern, we propose a feature fusion-based malicious code detection with dual attention mechanism and Bi-directional Long Short-Term Memory (BiLSTM). The dual attention mechanism module gives different focuses on the channel and space of feature maps to extract local texture features of malicious code grayscale images. At the same time, the BiLSTM module extracts global texture structure features of malicious code grayscale images, and fuse local texture features with global texture features, which can not only reflect the detailed characteristics of malicious code, but also retain the overall structural characteristics. Finally, we use the focal loss function to reduce the impact of data imbalance. The experimental results show that our feature fusion approach has a better detection effect compared with the single feature approach, especially in the detection of similar malicious code families.(c) 2022 Elsevier Ltd. All rights reserved.
引用
收藏
页数:8
相关论文
共 28 条
[1]  
[Anonymous], 2011, P 8 INT S VIS CYB SE, DOI 10.1145/2016904.2016908
[2]   Deep CNN-based damage classification of milled rice grains using a high-magnification image dataset [J].
Bhupendra ;
Moses, Kriz ;
Miglani, Ankur ;
Kankar, Pavan Kumar .
COMPUTERS AND ELECTRONICS IN AGRICULTURE, 2022, 195
[3]  
Cho Y., 2019, 2019 29 INT TEL NETW, P1, DOI DOI 10.1109/ITNAC46935.2019.9077961
[4]  
Choi S, 2017, I C INF COMM TECH CO, P1193, DOI 10.1109/ICTC.2017.8190895
[5]  
[崔弘 Cui Hong], 2017, [计算机应用研究, Application Research of Computers], V34, P1120
[6]   Malicious code detection based on CNNs and multi-objective algorithm [J].
Cui, Zhihua ;
Du, Lei ;
Wang, Penghong ;
Cai, Xingjuan ;
Zhang, Wensheng .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2019, 129 :50-58
[7]   Detection of Malicious Code Variants Based on Deep Learning [J].
Cui, Zhihua ;
Xue, Fei ;
Cai, Xingjuan ;
Cao, Yang ;
Wang, Gai-ge ;
Chen, Jinjun .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (07) :3187-3196
[8]   A comparison of static, dynamic, and hybrid analysis for malware detection [J].
Damodaran A. ;
Troia F.D. ;
Visaggio C.A. ;
Austin T.H. ;
Stamp M. .
Journal of Computer Virology and Hacking Techniques, 2017, 13 (01) :1-12
[9]   BinClone: Detecting Code Clones in Malware [J].
Farhadi, Mohammad Reza ;
Fung, Benjamin C. M. ;
Charland, Philippe .
2014 EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY, 2014, :78-87
[10]   A lightweight CNN for Diabetic Retinopathy classification from fundus images [J].
Gayathri, S. ;
Gopi, Varun P. ;
Palanisamy, P. .
BIOMEDICAL SIGNAL PROCESSING AND CONTROL, 2020, 62