A Hybrid Malicious Code Detection Method based on Deep Learning

@inproceedings{Li2015AHM,
  title={A Hybrid Malicious Code Detection Method based on Deep Learning},
  author={Yuancheng Li and Rong Ma and Runhai Jiao},
  year={2015}
}
In this paper, we propose a hybrid malicious code detection scheme based on AutoEncoder and DBN (Deep Belief Networks). Firstly, we use the AutoEncoder deep learning method to reduce the dimensionality of data. This could convert complicated high-dimensional data into low dimensional codes with the nonlinear mapping, thereby reducing the dimensionality of data, extracting the main features of the data; then using DBN learning method to detect malicious code. DBN is composed of multilayer… CONTINUE READING

Similar Papers

Citations

Publications citing this paper.
SHOWING 1-10 OF 33 CITATIONS

Anomaly-based Intrusion Detection Using Deep Neural Networks

VIEW 4 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Toward an Online Anomaly Intrusion Detection System Based on Deep Learning

  • 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA)
  • 2016
VIEW 7 EXCERPTS
CITES METHODS, BACKGROUND & RESULTS
HIGHLY INFLUENCED

A Survey of Deep Learning Methods for Cyber Security

VIEW 3 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Generative Malware Outbreak Detection

  • 2019 IEEE International Conference on Industrial Technology (ICIT)
  • 2019
VIEW 2 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

A comprehensive survey on machine learning for networking: evolution, applications and research opportunities

  • Journal of Internet Services and Applications
  • 2018
VIEW 4 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

A deep auto-encoder based approach for intrusion detection system

  • 2018 20th International Conference on Advanced Communication Technology (ICACT)
  • 2018
VIEW 4 EXCERPTS
CITES RESULTS, BACKGROUND & METHODS
HIGHLY INFLUENCED

A survey of deep learning-based network anomaly detection

  • Cluster Computing
  • 2017
VIEW 4 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Applying a Neural Network Ensemble to Intrusion Detection

  • J. Artif. Intell. Soft Comput. Res.
  • 2019
VIEW 1 EXCERPT
CITES METHODS

References

Publications referenced by this paper.
SHOWING 1-10 OF 14 REFERENCES

J

D. G. Kong, X. B. Tan, H. S. Xi, T. Gong, J. M. Shuai
  • Journal of Software, vol. 22, no. 3,
  • 2011
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

vol

P. C. Lin, Y. D. Lin, Y. C. Laiand, T. H. Lee, J. Computer Practices
  • 41, no. 4, (2008). International Journal of Security and Its Applications Vol. 9, No. 5
  • 2015

J

W. Wang, I. Murynets
  • Security and Communication Networks, vol. 6, no. 1,
  • 2013

J

R. Wang, D. G. Feng, Y. Yang, P. R. Su
  • Journal of Software, vol. 23, no. 2,
  • 2012

Editors

Y. Sawaya, A. Kubota, Y. Miyake
  • “Detection of attackers in services using anomalous host behavior based on traffic flow statistics”, IEEE/IPSJ 11th International Symposium,
  • 2011

J

Y. X. Ding, X. B. Yuan, D. Zhou, L. Dong, Z. C. An
  • Computers &Security, vol. 30, no. 6,
  • 2011

Editors

C. L. Tsai, C. C. Tseng, C. C. Han
  • “Intrusive behavior analysis based on honey pot tracking and ant algorithm analysis”, 43rd Annual 2009 International Carnahan Conference,
  • 2009

J

A. Shabtai, R. Moskovitch, Y. Elovici, C. Glezer
  • Information Security Technical Report, vol. 14, no. 1,
  • 2009

vol

G. E. Hinton, R. R. Salakhutdinov, J. Science
  • 313, no. 5786,
  • 2006
VIEW 3 EXCERPTS