• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

GSB:用于恶意软件动态检测的 GNGS 和 SAG-BiGRU 网络。

GSB: GNGS and SAG-BiGRU network for malware dynamic detection.

机构信息

College of Information Engineering, Shanghai Maritime University, Shanghai, China.

College of Artificial Intelligence, Jiangxi University of Technology, Jiangxi, China.

出版信息

PLoS One. 2024 Apr 18;19(4):e0298809. doi: 10.1371/journal.pone.0298809. eCollection 2024.

DOI:10.1371/journal.pone.0298809
PMID:38635682
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11025902/
Abstract

With the rapid development of the Internet, the continuous increase of malware and its variants have brought greatly challenges for cyber security. Due to the imbalance of the data distribution, the research on malware detection focuses on the accuracy of the whole data sample, while ignoring the detection rate of the minority categories' malware. In the dataset sample, the normal data samples account for the majority, while the attacks' malware accounts for the minority. However, the minority categories' attacks will bring great losses to countries, enterprises, or individuals. For solving the problem, this study proposed the GNGS algorithm to construct a new balance dataset for the model algorithm to pay more attention to the feature learning of the minority attacks' malware to improve the detection rate of attacks' malware. The traditional malware detection method is highly dependent on professional knowledge and static analysis, so we used the Self-Attention with Gate mechanism (SAG) based on the Transformer to carry out feature extraction between the local and global features and filter irrelevant noise information, then extracted the long-distance dependency temporal sequence features by the BiGRU network, and obtained the classification results through the SoftMax classifier. In the study, we used the Alibaba Cloud dataset for malware multi-classification. Compared the GSB deep learning network model with other current studies, the experimental results showed that the Gaussian noise generation strategy (GNGS) could solve the unbalanced distribution of minority categories' malware and the SAG-BiGRU algorithm obtained the accuracy rate of 88.7% on the eight-classification, which has better performance than other existing algorithms, and the GSB model also has a good effect on the NSL-KDD dataset, which showed the GSB model is effective for other network intrusion detection.

摘要

随着互联网的飞速发展,恶意软件及其变种的不断增加给网络安全带来了极大的挑战。由于数据分布不平衡,恶意软件检测的研究侧重于整个数据样本的准确性,而忽略了少数类别恶意软件的检测率。在数据集样本中,正常数据样本占多数,而攻击恶意软件占少数。然而,少数类别的攻击会给国家、企业或个人带来巨大的损失。为了解决这个问题,本研究提出了 GNGS 算法,为模型算法构建一个新的平衡数据集,使模型算法更加关注少数攻击恶意软件的特征学习,提高攻击恶意软件的检测率。传统的恶意软件检测方法高度依赖专业知识和静态分析,因此我们使用基于 Transformer 的 Self-Attention with Gate mechanism (SAG) 来进行局部和全局特征之间的特征提取,并过滤无关的噪声信息,然后通过 BiGRU 网络提取长距离依赖的时间序列特征,并通过 SoftMax 分类器获得分类结果。在研究中,我们使用阿里云数据集进行恶意软件多分类。将 GSB 深度学习网络模型与其他当前研究进行比较,实验结果表明,高斯噪声生成策略(GNGS)可以解决少数类别恶意软件的不平衡分布问题,SAG-BiGRU 算法在八分类中的准确率达到 88.7%,性能优于其他现有算法,GSB 模型在 NSL-KDD 数据集上也有很好的效果,表明 GSB 模型对其他网络入侵检测也有很好的效果。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/884a/11025902/133b6c8546af/pone.0298809.g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/884a/11025902/db42e94a1990/pone.0298809.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/884a/11025902/f4f347fad9af/pone.0298809.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/884a/11025902/2b7ca2d4a383/pone.0298809.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/884a/11025902/fb1d1954d557/pone.0298809.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/884a/11025902/dbd158428058/pone.0298809.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/884a/11025902/ba50a41c3d49/pone.0298809.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/884a/11025902/4e058c4fdd54/pone.0298809.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/884a/11025902/a10fd864db4d/pone.0298809.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/884a/11025902/133b6c8546af/pone.0298809.g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/884a/11025902/db42e94a1990/pone.0298809.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/884a/11025902/f4f347fad9af/pone.0298809.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/884a/11025902/2b7ca2d4a383/pone.0298809.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/884a/11025902/fb1d1954d557/pone.0298809.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/884a/11025902/dbd158428058/pone.0298809.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/884a/11025902/ba50a41c3d49/pone.0298809.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/884a/11025902/4e058c4fdd54/pone.0298809.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/884a/11025902/a10fd864db4d/pone.0298809.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/884a/11025902/133b6c8546af/pone.0298809.g009.jpg

相似文献

1
GSB: GNGS and SAG-BiGRU network for malware dynamic detection.GSB:用于恶意软件动态检测的 GNGS 和 SAG-BiGRU 网络。
PLoS One. 2024 Apr 18;19(4):e0298809. doi: 10.1371/journal.pone.0298809. eCollection 2024.
2
Sparse attention with residual pyramidal depthwise separable convolutional based malware detection with optimization mechanism.基于带有优化机制的残差金字塔深度可分离卷积的稀疏注意力恶意软件检测
Sci Rep. 2024 Oct 18;14(1):24414. doi: 10.1038/s41598-024-76193-4.
3
A hybrid feature weighted attention based deep learning approach for an intrusion detection system using the random forest algorithm.基于混合特征加权注意力的深度学习方法与随机森林算法在入侵检测系统中的应用。
PLoS One. 2024 May 23;19(5):e0302294. doi: 10.1371/journal.pone.0302294. eCollection 2024.
4
A Study on the Application of Distributed System Technology-Guided Machine Learning in Malware Detection.分布式系统技术指导下的机器学习在恶意软件检测中的应用研究
Comput Intell Neurosci. 2022 Feb 23;2022:4977898. doi: 10.1155/2022/4977898. eCollection 2022.
5
An Efficient DenseNet-Based Deep Learning Model for Malware Detection.一种基于高效密集连接网络的恶意软件检测深度学习模型。
Entropy (Basel). 2021 Mar 15;23(3):344. doi: 10.3390/e23030344.
6
Network Intrusion Detection Technology Based on Convolutional Neural Network and BiGRU.基于卷积神经网络和双向门控循环单元的网络入侵检测技术
Comput Intell Neurosci. 2022 Apr 12;2022:1942847. doi: 10.1155/2022/1942847. eCollection 2022.
7
Evaluation of Machine Learning Algorithms for Malware Detection.机器学习算法在恶意软件检测中的评估。
Sensors (Basel). 2023 Jan 13;23(2):946. doi: 10.3390/s23020946.
8
Towards an Effective Intrusion Detection Model Using Focal Loss Variational Autoencoder for Internet of Things (IoT).基于焦点损失变分自动编码器的物联网(IoT)有效入侵检测模型。
Sensors (Basel). 2022 Aug 4;22(15):5822. doi: 10.3390/s22155822.
9
Deep learning-based improved transformer model on android malware detection and classification in internet of vehicles.基于深度学习的改进型变压器模型在车联网安卓恶意软件检测与分类中的应用
Sci Rep. 2024 Oct 24;14(1):25175. doi: 10.1038/s41598-024-74017-z.
10
Malware detection based on semi-supervised learning with malware visualization.基于半监督学习和恶意软件可视化的恶意软件检测。
Math Biosci Eng. 2021 Jul 2;18(5):5995-6011. doi: 10.3934/mbe.2021300.

本文引用的文献

1
Deep Learning Based Intrusion Detection With Adversaries.基于深度学习的对抗性入侵检测
IEEE Access. 2018;6. doi: 10.1109/access.2018.2854599.
2
Research on data imbalance in intrusion detection using CGAN.基于 CGAN 的入侵检测数据不平衡问题研究。
PLoS One. 2023 Oct 10;18(10):e0291750. doi: 10.1371/journal.pone.0291750. eCollection 2023.
3
An improved long short term memory network for intrusion detection.改进的长短时记忆网络入侵检测。
PLoS One. 2023 Aug 1;18(8):e0284795. doi: 10.1371/journal.pone.0284795. eCollection 2023.
4
State-of-the-art augmented NLP transformer models for direct and single-step retrosynthesis.最先进的增强型自然语言处理转换器模型,用于直接和单步逆合成。
Nat Commun. 2020 Nov 4;11(1):5575. doi: 10.1038/s41467-020-19266-y.