• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于可解释人工智能的物联网设备恶意软件检测机制,使用图像可视化和微调的基于卷积神经网络的迁移学习模型。

Explainable Artificial Intelligence-Based IoT Device Malware Detection Mechanism Using Image Visualization and Fine-Tuned CNN-Based Transfer Learning Model.

机构信息

School of Computer Science and Technology, Zhoukou Normal University, Zhoukou 466001, Henan, China.

School of Computer and Information Sciences, Jouf University, Sakakah, Saudi Arabia.

出版信息

Comput Intell Neurosci. 2022 Jul 15;2022:7671967. doi: 10.1155/2022/7671967. eCollection 2022.

DOI:10.1155/2022/7671967
PMID:35875737
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9307336/
Abstract

Automated malware detection is a prominent issue in the world of network security because of the rising number and complexity of malware threats. It is time-consuming and resource intensive to manually analyze all malware files in an application using traditional malware detection methods. Polymorphism and code obfuscation were created by malware authors to bypass the standard signature-based detection methods used by antivirus vendors. Malware detection using deep learning (DL) approaches has recently been implemented in an effort to address this problem. This study compares the detection of IoT device malware using three current state-of-the-art CNN models that have been pretrained. Large-scale learning performance using GNB, SVM, DT, LR, K-NN, and ensemble classifiers with CNN models is also included in the results. In light of the findings, a pretrained Inception-v3 CNN-based transfer learned model with fine-tuned strategy is proposed to identify IoT device malware by utilizing color image malware display of android Dalvik Executable File (DEX). Inception-v3 retrieves the malware's most important features. After that, a global max-pooling layer is applied, and a SoftMax classifier is used to classify the features. Finally, gradient-weighted class activation mapping (Grad-CAM) along the t-distributed stochastic neighbor embedding (t-SNE) is used to understand the overall performance of the proposed method. The proposed method achieved an accuracy of 98.5% and 91%, respectively, in the binary and multiclass prediction of malware images from IoT devices, exceeding the comparison methods in different evaluation parameters.

摘要

自动化恶意软件检测是网络安全领域的一个突出问题,因为恶意软件威胁的数量和复杂性不断增加。使用传统的恶意软件检测方法手动分析应用程序中的所有恶意软件文件既耗时又耗资源。恶意软件作者创建了多态性和代码混淆技术,以绕过防病毒供应商使用的标准基于签名的检测方法。最近,已经实施了使用深度学习 (DL) 方法来检测恶意软件,以解决这个问题。本研究比较了使用三种经过预先训练的当前最先进的 CNN 模型对物联网设备恶意软件的检测。结果还包括使用 GNB、SVM、DT、LR、K-NN 和集成分类器对 CNN 模型进行大规模学习性能的评估。鉴于这些发现,提出了一种基于预训练的 Inception-v3 CNN 的迁移学习模型,该模型采用细调策略,通过利用安卓 Dalvik 可执行文件 (DEX) 的彩色图像恶意软件显示来识别物联网设备恶意软件。Inception-v3 提取恶意软件的最重要特征。然后,应用全局最大池化层,并使用 SoftMax 分类器对特征进行分类。最后,使用梯度加权类激活映射 (Grad-CAM) 沿 t 分布随机邻域嵌入 (t-SNE) 来了解所提出方法的整体性能。所提出的方法在二进制和多类预测中分别实现了 98.5%和 91%的物联网设备恶意软件图像的准确率,在不同的评估参数方面超过了比较方法。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8815/9307336/9b89767a1620/CIN2022-7671967.010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8815/9307336/76e93b3a3b12/CIN2022-7671967.001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8815/9307336/8c1a5db494cb/CIN2022-7671967.002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8815/9307336/558dedcac737/CIN2022-7671967.003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8815/9307336/3c183bb3e589/CIN2022-7671967.004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8815/9307336/6d09a7c16efa/CIN2022-7671967.005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8815/9307336/80115c7ef063/CIN2022-7671967.006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8815/9307336/b3ec2039afc6/CIN2022-7671967.007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8815/9307336/163962753b5d/CIN2022-7671967.008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8815/9307336/37615b51645b/CIN2022-7671967.009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8815/9307336/9b89767a1620/CIN2022-7671967.010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8815/9307336/76e93b3a3b12/CIN2022-7671967.001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8815/9307336/8c1a5db494cb/CIN2022-7671967.002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8815/9307336/558dedcac737/CIN2022-7671967.003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8815/9307336/3c183bb3e589/CIN2022-7671967.004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8815/9307336/6d09a7c16efa/CIN2022-7671967.005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8815/9307336/80115c7ef063/CIN2022-7671967.006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8815/9307336/b3ec2039afc6/CIN2022-7671967.007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8815/9307336/163962753b5d/CIN2022-7671967.008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8815/9307336/37615b51645b/CIN2022-7671967.009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8815/9307336/9b89767a1620/CIN2022-7671967.010.jpg

相似文献

1
Explainable Artificial Intelligence-Based IoT Device Malware Detection Mechanism Using Image Visualization and Fine-Tuned CNN-Based Transfer Learning Model.基于可解释人工智能的物联网设备恶意软件检测机制,使用图像可视化和微调的基于卷积神经网络的迁移学习模型。
Comput Intell Neurosci. 2022 Jul 15;2022:7671967. doi: 10.1155/2022/7671967. eCollection 2022.
2
Deep Feature Extraction and Classification of Android Malware Images.安卓恶意软件图像的深度特征提取与分类。
Sensors (Basel). 2020 Dec 8;20(24):7013. doi: 10.3390/s20247013.
3
Artificial Intelligence Algorithms for Malware Detection in Android-Operated Mobile Devices.人工智能算法在安卓操作系统移动设备中的恶意软件检测。
Sensors (Basel). 2022 Mar 15;22(6):2268. doi: 10.3390/s22062268.
4
Convolution neural network with batch normalization and inception-residual modules for Android malware classification.基于批量归一化和 Inception-Residual 模块的卷积神经网络用于安卓恶意软件分类。
Sci Rep. 2022 Aug 17;12(1):13996. doi: 10.1038/s41598-022-18402-6.
5
IoT malware detection architecture using a novel channel boosted and squeezed CNN.使用新型通道增强与压缩卷积神经网络的物联网恶意软件检测架构
Sci Rep. 2022 Sep 15;12(1):15498. doi: 10.1038/s41598-022-18936-9.
6
Explainable Malware Detection System Using Transformers-Based Transfer Learning and Multi-Model Visual Representation.基于转换器的迁移学习和多模型视觉表示的可解释恶意软件检测系统。
Sensors (Basel). 2022 Sep 7;22(18):6766. doi: 10.3390/s22186766.
7
Transfer Learning for Image-Based Malware Detection for IoT.基于图像的物联网恶意软件检测的迁移学习。
Sensors (Basel). 2023 Mar 20;23(6):3253. doi: 10.3390/s23063253.
8
Malware Detection in Internet of Things (IoT) Devices Using Deep Learning.基于深度学习的物联网(IoT)设备恶意软件检测。
Sensors (Basel). 2022 Nov 29;22(23):9305. doi: 10.3390/s22239305.
9
A malware detection system using a hybrid approach of multi-heads attention-based control flow traces and image visualization.一种采用基于多头注意力的控制流跟踪和图像可视化混合方法的恶意软件检测系统。
J Cloud Comput (Heidelb). 2022;11(1):75. doi: 10.1186/s13677-022-00349-8. Epub 2022 Nov 3.
10
A Modified ResNeXt for Android Malware Identification and Classification.一种用于 Android 恶意软件识别和分类的改进型 ResNeXt。
Comput Intell Neurosci. 2022 May 20;2022:8634784. doi: 10.1155/2022/8634784. eCollection 2022.

引用本文的文献

1
Advancing malware imagery classification with explainable deep learning: A state-of-the-art approach using SHAP, LIME and Grad-CAM.利用可解释深度学习推进恶意软件图像分类:一种使用SHAP、LIME和Grad-CAM的先进方法。
PLoS One. 2025 May 28;20(5):e0318542. doi: 10.1371/journal.pone.0318542. eCollection 2025.

本文引用的文献

1
Predicting disease risks from highly imbalanced data using random forest.基于随机森林算法从高度不平衡数据中预测疾病风险。
BMC Med Inform Decis Mak. 2011 Jul 29;11:51. doi: 10.1186/1472-6947-11-51.