期刊文献+

一种基于改进深度残差收缩网络的恶意应用检测方法

Detection of malicious applications based on improved deep residual shrinkage network
下载PDF
导出
摘要 恶意应用的快速增长给移动智能终端带来了巨大的安全威胁,实现恶意应用高精度检测对移动网络信息安全具有重要意义.本文提出一种基于改进深度残差收缩网络的恶意应用检测方法.首先将流量特征预处理成卷积神经网络输入,接着引入通道注意力机制和空间注意力机制,从通道和空间两个维度对样本特征进行加权.然后再引入深度残差收缩网络,自适应滤除样本冗余特征并通过恒等连接优化参数反向传播,减小模型训练和分类的难度,最终实现安卓恶意应用高精度识别.所提方法可避免手工提取特征,能实现高精度分类并且具有一定泛化能力.实验结果表明,所提方法在恶意应用的2分类、4分类和42分类中准确率分别为99.40%、99.95%和97.33%,与现有方法相比,具有较高的分类性能与泛化能力. The rapid growth of malicious applications has posed a security threat to mobile intelligent terminals.It is of great significance to achieve high-precision detection of malicious applications for mobile network information security.Here,this paper proposes a method to detect malicious applications based on improved deep residual shrinkage network.First,the traffic features are preprocessed into convolutional neural network inputs,and then the channel attention mechanism and spatial attention mechanism are introduced to weight the sample features from the channel and spatial dimensions.Then,the deep residual shrinkage network is introduced to adaptively filter out the redundant features of the samples,and the parameters are back propagated through the identical connection optimization,so as to reduce the difficulty of model training and classification,and finally realize the high-precision identification of malicious android applications.The proposed method avoids manual feature extraction,achieves high-precision classification and has certain generalization ability.Experimental results show that the accuracy of the proposed method is 99.40%,99.95%and 97.33%in 2-classification,4-classification and 42-classification of malicious applications,respectively.Compared with the existing methods,the proposed method has better classification performance and generalization ability.
作者 许历隆 翟江涛 林鹏 崔永富 XU Lilong;ZHAI Jiangtao;LIN Peng;CUI Yongfu(School of Electronics&Information Engineering,Nanjing University of Information Science&Technology,Nanjing 210044)
出处 《南京信息工程大学学报(自然科学版)》 CAS 北大核心 2022年第3期368-378,共11页 Journal of Nanjing University of Information Science & Technology(Natural Science Edition)
基金 国家自然科学基金(U1836104,61772281,61801073,61931004,62072250) 南京信息工程大学人才启动基金(2020r061)。
关键词 恶意应用 恶意家族 深度残差收缩网络 信息安全 malicious application malicious families deep residual shrinkage network information security
  • 相关文献

参考文献2

二级参考文献15

  • 1Andreas M, Christopher K, Engin K. Limits of static analysis for malware detection[C] //Proc of the 23rd Annual Computer Security Applications Conference. 2007.
  • 2Zheng Min, Sun Mingshen, Lui J C S. DroidAnalytics:a signature based analytic system to collect, extract, analyze and associate android malware[C] //Proc of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. 2013.
  • 3Alazab M, Moonsamy V, Batten L, et al. Analysis of malicious andbenign Android applications[ C ]//Proc of the 32nd International Con- ference on Distributed Computing Systems Workshops. 2012: 608- 616.
  • 4Enck W, Gilbert P, Han S, et al. TaintDroid:an information-flow tracking system for realtime privacy monitoring on smartphones[C] //Proc of the 9th USENIX Symposium on Operating Systems Design and Implementation. 2010.
  • 5Burguera I, Zurutuza U, Nadjm-Tehrani S. CrowDroid:behavior-based malware detection system for Android[C] //Proc of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices. 2011.
  • 6Zhou Yajin, Jiang Xuxian. Dissecting Android malware:characterization and evolution[C] //Proc of the 33rd IEEE Symposium on Security and Privacy. 2012.
  • 7Wei Teen, Mao C H, Teng A B, et al. Android malware detection via a latent network behavior analysis[C] //Proc of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. Washington DC:IEEE Computer Society, 2012:1251-1258.
  • 8Comparetti P M, Salvaneschi G, Kirda E, et al. Identifying dormant functionality in malware programs[C] //Proc of the 31st IEEE Symposium on Security and Privacy. 2010:61-76.
  • 9Mamoun A, Sitalakshmi V, Paul W. Towards understanding malware behaviour by the extraction of API calls[C] //Proc of the 2nd Cybercrime and Trustworthy Computing Workshop. 2010.
  • 10Adrienne P, Matthew F, Erika C, et al. A survey of mobile malware in the wild[C] //Proc of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices. 2011.

共引文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部