期刊文献+

基于值导数GRU的移动恶意软件流量检测方法 被引量:17

Mobile malware traffic detection approach based on value-derivative GRU
下载PDF
导出
摘要 针对移动恶意软件数量和种类的急剧增加给移动用户的信息安全带来的巨大挑战,提出了一种基于值导数GRU的移动恶意软件流量检测方法,旨在解决基于RNN的移动恶意软件流量检测方法难以捕获网络异常流量的动态变化和关键信息的问题。值导数GRU算法通过引入"累计状态变化"的概念,可以同时描述移动网络恶意流量的低阶和高阶动态变化信息。此外,通过增设池化层使算法可以捕获移动恶意流量的关键信息。最后,通过仿真实验分析累计状态变化、隐藏层和池化层对于值导数GRU算法性能的影响。实验表明,基于值导数GRU的移动恶意软件流量检测方法拥有较高的检测准确率。 For the dramatic increase in the number and variety of mobile malware had created enormous challenge for information security of mobile network users, a value-derivative GRU-based mobile malware traffic detection approach was proposed in order to solve the problem that it was difficult for a RNN-based mobile malware traffic detection approach to capture the dynamic changes and critical information of abnormal network traffic. The low-order and high-order dynamic change information of the malicious network traffic could be described by the value-derivative GRU approach at the same time by introducing the concept of "accumulated state change". In addition, a pooling layer could ensure that the algorithm can capture key information of malicious traffic. Finally, simulation were performed to verify the effect of accumulated state changes, hidden layers, and pooling layers on the performance of the value-derivative GRU algorithm. Experiments show that the mobile malware traffic detection approach based on value-derivative GRU has high detection accuracy.
作者 周翰逊 陈晨 冯润泽 熊俊坤 潘宏 郭薇 ZHOU Hanxun;CHEN Chen;FENG Runze;XIONG Junkun;PAN Hong;GUO Wei(Information Academy,LiaoNing University,Shenyang 110036,China;Digital Economy Academy,LiaoNing University,Shenyang 110036,China;Computer Academy,Shenyang Aerospace University,Shenyang 110135,China)
出处 《通信学报》 EI CSCD 北大核心 2020年第1期102-113,共12页 Journal on Communications
基金 国家自然科学基金资助项目(No.61300233,No.61402298,No.61472169,No.51704138) 辽宁省教育厅基金资助项目(No.JYT19053) 辽宁省自然科学基金资助项目(No.2019-MS-149)~~
关键词 网络安全 移动恶意软件 RNN 值导数GRU 流量检测 network security mobile malware RNN value-derivative GRU traffic detection
  • 相关文献

参考文献2

二级参考文献39

  • 1Gartner, Gartner says Android has surpassed a billion shipments of devices, http://www.gartner.com/ newsroongid/2954317, 2015.
  • 2T. Vidas, D. Votipka, and N. Christin, All your droid are belong to us: A survey of current Android attacks, inProceedings of the 5th USENIX Workshop on Offensive Technologies (WOOT), 2011, pp. 81-90.
  • 3A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner, A survey of mobile malware in the wild, in Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), 2011, pp. 3-14.
  • 4McAfee, McAfee labs threats report, http://www. mcafee.con-dus/resources/reports/rp-quarterly-threat-q4- 2013.pdf, 2015.
  • 5A. Mylonas, A. Kastania, and D. Gritzalis, Delegate the smartphone user? Security awareness in smartphone platforms, Computers & Security, vol. 34, pp. 47-66, 2013.
  • 6Z. Fang, W. Han, and Y. Li, Permission based Android security: Issues and countermeasures, Computers & Security, vol. 43, pp. 205-218, 2014.
  • 7J. Xu, Y.-T. Yu, Z. Chert, B. Cao, W. Dong, Y. Guo, and J. Cao, Mobsafe: Cloud computing based forensic analysis for massive mobile applications using data mining, Tsinghua Science and Technology, vol. 18, no. 4, pp. 418--427, 2013.
  • 8R. Pandita, X. Xiao, W. Yang, W. Enck, and T. Xie, Whyper: Towards automating risk assessment of mobile applications, in Proceedings of the 22nd USENIX Security Symposium (USENIX Security), 2013, pp. 527-542.
  • 9Z. Qu, V. Rastogi, X. Zhang, Y. Chen, T. Zhu, and Z. Chen, Autocog: Measuring the description-to-permission fidelity in Android applications, in Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS), 2014, pp. 1354-1365.
  • 10D. Geneiatakis, I. N. Fovino, I. Kounelis, and P. Stirparo, A permission verification approach for Android mobile applications, Computers & Security, vol. 49, pp. 192-205, 2015.

共引文献43

同被引文献160

引证文献17

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部