Computer Science ›› 2021, Vol. 48 ›› Issue (10): 308-314.doi: 10.11896/jsjkx.210200166

• Information Security • Previous Articles     Next Articles

Method of Malware Family Classification Based on Attention-DenseNet-BC Model Mechanism

LI Yi-meng, LI Cheng-hai, SONG Ya-fei, WANG Jian   

  1. Air and Missile Defense College,Air Force Engineering University,Xi'an 710051,China
  • Received:2021-02-25 Revised:2021-07-01 Online:2021-10-15 Published:2021-10-18
  • About author:LI Yi-meng,born in 1997,postgra-duate.Her main research interests include network information defense and so on.
    LI Cheng-hai,born in 1966,Ph.D,professor.His main research interests include evidence theory,embedded systems,and network security.
  • Supported by:
    National Natural Science Foundation of China(61703426),Young Talents Promotion Program of Shaanxi University Science and Technology Association(2019038) and Innovation Capability Support Plan of Shaanxi Province(2019-065).

Abstract: Malware is one of the most serious threats to the Internet.The existing malware has huge data size and various features.Convolutional Neural Network has the features of autonomous learning,which can be used to solve the problems that the feature extraction of malware is complex and the feature selection is difficult.However,in convolutional neural network,conti-nuously increasing the network layers will cause a disappear of the gradient,leading to a degradation of network performance and low accuracy.To solve this problem,an Attention-DenseNet-BC model that is suitable for malware image detection is proposed.First,the Attention-DenseNet-BC model is constructed by combining the DenseNet-BC network and the attention mechanism.Then,the malware images are used as the input of the model,and the detection results are obtained by training and testing the model.The experimental results indicate that compared with other deep learning models,the Attention-DenseNet-BC model can achieve better classification results.A high classification accuracy can be attained with the model based on the malimg public dataset.

Key words: Attention mechanism, DenseNet-BC network, Malware

CLC Number: 

  • TP393.08
[1]CNNIC.The 46th China Statistical Report on Internet Development [EB/OL].(2020-09-29).http://www.gov.cn/xinwen/2020-09/29/content_5548175.htm.
[2]CNCERT.Analysis Report of China's Internet Network Security Monitoring Data in the First Half of 2020[EB/OL].(2020-09-26).http://www.cac.gov.cn/2020-09/26/c_1602682854845452.htm.
[3]ZHANG C,GUO Y,LI M.A review of development and application of artificial neural network models [J/OL].Computer Engineering and Applications.https://kns-cnki-net.webvpn.bjmu.edu.cn/kcms/detail/11.2127.TP.20210402.1348.004.html.
[4]WANG G D,LU T L,YIN H R,et al.Malicious Code Family Detection Technology Based on CNN-BILSTM[J].Computer Engineering and Applications,2020,56(24):72-77.
[5]LONG T Y,WAN L,DING H W.Research on the Application of Autocoding Network in Javascript Malicious Code Detection[J].Computer Science and Exploration,2019,13(12):2073-2084.
[6]HAO J W,LUO S L,ZHANG H Q,et al.Android maliciousAPP multi-view family classification method [J/OL].Journal of Beijing University of Aeronautics and Astronautics.https://doi-org-443.webvpn.bjmu.edu.cn/10.13700/j.bh.1001-5965.2020.0658.
[7]LI Y,LUO S L,HAO J W,et al.Malware family classification method based on abstract assembly instructions[J/OL].Journal of Beijing University of Aeronautics and Astronautics.https://doi-org-443.webvpn.bjmu.edu.cn/10.13700/j.bh.1001-5965.2020.0568.
[8]KRIZHEVSKY A,SUTSKEVER I,HINTON G E.ImageNet classification with deep convolutional neural networks[C]//the Proceedings of the 25th International Conference on Neural Information Processing Systems.2012:1097-1105.
[9]LECUN Y,BOTTOU L,BENGIO Y,et al.Gradient-BasedLearning Applied to Document Recognition[J].Proceedings of the IEEE,1998,86(11):2278-2324.
[10]SIMONYAN K,ZISSERMAN A.Very Deep Convolutional Networks for Large-Scale Image Recognition[J].Computer Scien-ce,2014(7):21-34.
[11]SZEGEDY C,LIU W,JIA Y Q,et al.Going Deeper with Convolutions[C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.2015:1-9.
[12]SZEGEDY C,VANHOUCKE V,IOFFE S,et al.Rethinking the Inception Architecture for Computer Vision[C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.2016:2818-2826.
[13]HE K,ZHANG X Y,REN S Q,et al.Deep Residual Learning for Image Recognition[C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.2016:770-778.
[14]LONG J,SHELHAMER E,DARRELL T,et al.Fully Convolutional Networks for Semantic Segmentation[C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.2015:3431-3440.
[15]GREFF K,SRIVASTAVA R K,KOUTNÍK J,et al.LSTM:A Search Space Odyssey[C]//IEEE Transactions on Neural Networks and Learning Systems.2017:2222-2232.
[16]CHO K,MERRIENBOER B V,GULCEHRE C,et al.Learning Phrase Representations Using RNN Encoder-Decoder for Statistical Machine Translation[C]//Proceedings of the 2014 Confe-rence on Empirical Methods in Natural Language Processing (EMNLP).Stroudsburg,PA:ACL,2014:1724-1734.
[17]HUANG G,LIU Z,WEINBERGER K Q,et al.Densely Connected Convolutional Networks[C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.2017:4700-4708.
[18]HU J,SHEN L,ALBANIE S,et al.Squeeze-and-Excitation Networks[C]//IEEE Transactions on Pattern Analysis and Machine Intelligence.2019:2011-2023.
[19]BHODIA N,PRAJAPATI P,TROIA F D,et al.TransferLearning for Image-Based Malware Classification[C]//International Conference on International Workshop on Formal Me-thods for Security Engineering.2019.
[1] ZHOU Fang-quan, CHENG Wei-qing. Sequence Recommendation Based on Global Enhanced Graph Neural Network [J]. Computer Science, 2022, 49(9): 55-63.
[2] DAI Yu, XU Lin-feng. Cross-image Text Reading Method Based on Text Line Matching [J]. Computer Science, 2022, 49(9): 139-145.
[3] ZHOU Le-yuan, ZHANG Jian-hua, YUAN Tian-tian, CHEN Sheng-yong. Sequence-to-Sequence Chinese Continuous Sign Language Recognition and Translation with Multi- layer Attention Mechanism Fusion [J]. Computer Science, 2022, 49(9): 155-161.
[4] XIONG Li-qin, CAO Lei, LAI Jun, CHEN Xi-liang. Overview of Multi-agent Deep Reinforcement Learning Based on Value Factorization [J]. Computer Science, 2022, 49(9): 172-182.
[5] RAO Zhi-shuang, JIA Zhen, ZHANG Fan, LI Tian-rui. Key-Value Relational Memory Networks for Question Answering over Knowledge Graph [J]. Computer Science, 2022, 49(9): 202-207.
[6] WANG Ming, PENG Jian, HUANG Fei-hu. Multi-time Scale Spatial-Temporal Graph Neural Network for Traffic Flow Prediction [J]. Computer Science, 2022, 49(8): 40-48.
[7] JIANG Meng-han, LI Shao-mei, ZHENG Hong-hao, ZHANG Jian-peng. Rumor Detection Model Based on Improved Position Embedding [J]. Computer Science, 2022, 49(8): 330-335.
[8] ZHANG Guang-hua, GAO Tian-jiao, CHEN Zhen-guo, YU Nai-wen. Study on Malware Classification Based on N-Gram Static Analysis Technology [J]. Computer Science, 2022, 49(8): 336-343.
[9] ZHU Cheng-zhang, HUANG Jia-er, XIAO Ya-long, WANG Han, ZOU Bei-ji. Deep Hash Retrieval Algorithm for Medical Images Based on Attention Mechanism [J]. Computer Science, 2022, 49(8): 113-119.
[10] SUN Qi, JI Gen-lin, ZHANG Jie. Non-local Attention Based Generative Adversarial Network for Video Abnormal Event Detection [J]. Computer Science, 2022, 49(8): 172-177.
[11] YAN Jia-dan, JIA Cai-yan. Text Classification Method Based on Information Fusion of Dual-graph Neural Network [J]. Computer Science, 2022, 49(8): 230-236.
[12] JIN Fang-yan, WANG Xiu-li. Implicit Causality Extraction of Financial Events Integrating RACNN and BiLSTM [J]. Computer Science, 2022, 49(7): 179-186.
[13] XIONG Luo-geng, ZHENG Shang, ZOU Hai-tao, YU Hua-long, GAO Shang. Software Self-admitted Technical Debt Identification with Bidirectional Gate Recurrent Unit and Attention Mechanism [J]. Computer Science, 2022, 49(7): 212-219.
[14] PENG Shuang, WU Jiang-jiang, CHEN Hao, DU Chun, LI Jun. Satellite Onboard Observation Task Planning Based on Attention Neural Network [J]. Computer Science, 2022, 49(7): 242-247.
[15] ZHANG Ying-tao, ZHANG Jie, ZHANG Rui, ZHANG Wen-qiang. Photorealistic Style Transfer Guided by Global Information [J]. Computer Science, 2022, 49(7): 100-105.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!