Towards improving detection performance for malware with a correntropy-based deep learning method

Digital Communications and Networks - Tập 7 - Trang 570-579 - 2021
Xiong Luo1,2,3, Jianyuan Li1,2,3, Weiping Wang1,2,3, Yang Gao4, Wenbing Zhao5
1School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing 100083, China
2Beijing Key Laboratory of Knowledge Engineering for Materials Science, Beijing 100083, China
3Beijing Intelligent Logistics System Collaborative Innovation Center, Beijing, 101149, China
4China Information Technology Security Evaluation Center, Beijing 100085, China
5Department of Electrical Engineering and Computer Science, Cleveland State University, Cleveland, OH 44115, USA

Tài liệu tham khảo

Lee, 2008, Cyber physical systems: design challenges, 363 Ochoa, 2017, Cyber-physical systems, internet of things and big data, Future Generat. Comput. Syst., 75, 82, 10.1016/j.future.2017.05.040 Wang, 2019, Fog-based computing and storage offloading for data synchronization in iot, IEEE Internet Things J., 6, 4272, 10.1109/JIOT.2018.2875915 Ma, 2019, An iot-based task scheduling optimization scheme considering the deadline and cost-aware scientific workflow for cloud computing, EURASIP J. Wirel. Commun. Netw., 249, 10.1186/s13638-019-1557-3 Zhang, 2019, Modeling iot equipment with graph neural networks, IEEE Access, 7, 32754, 10.1109/ACCESS.2019.2902865 Chen, 2017, Special issue on situation, activity, and goal awareness in cyber-physical human-machine systems, IEEE Trans. Human-Machine Syst., 47, 305, 10.1109/THMS.2017.2689178 Neuman, 2009, Challenges in security for cyber-physical systems, 22 Stolfo, 2005 Thakar, 2016, System and method to detect domain generation algorithm malware and systems infected by such malware, 14/466, 806 Taylor, 2001, Nate - network analysis of anomalous traffic events, a low-cost approach, 89 Xiao, 2019, Android malware detection based on system call sequences and lstm, Multimed. Tool. Appl., 78, 3979, 10.1007/s11042-017-5104-0 Peiravian, 2013, Machine learning for android malware detection using permission and api calls, 300 Ding, 2019, Malware detection based on deep learning algorithm, Neural Comput. Appl., 31, 461, 10.1007/s00521-017-3077-6 Luo, 2019, User behavior prediction in social networks using weighted extreme learning machine with distribution optimization, Future Generat. Comput. Syst., 93, 1023, 10.1016/j.future.2018.04.085 Luo, 2020, A robust multilayer extreme learning machine using kernel risk-sensitive loss criterion, Int. J. Mach. Learn. Cybernet., 11, 197, 10.1007/s13042-019-00967-w Sun, 2020, Categorizing malware via a word2vec-based temporal convolutional network scheme, J. Cloud Comput., 9, 53, 10.1186/s13677-020-00200-y Tobiyama, 2016, Malware detection with deep neural network using process behavior, vol. 2, 577 Liu, 2006, Correntropy: a localized similarity measure, 4919 Gunduz, 2009, Correntropy as a novel measure for nonlinearity tests, Signal Process., 89, 14, 10.1016/j.sigpro.2008.07.005 Luo, 2018, Towards enhancing stacked extreme learning machine with sparse autoencoder by correntropy, J. Franklin Inst., 355, 1945, 10.1016/j.jfranklin.2017.08.014 Chen, 2018, Generalized correntropy based deep learning in presence of non-Gaussian noises, Neurocomputing, 278, 41, 10.1016/j.neucom.2017.06.080 Luo, 2018, Short-term wind speed forecasting via stacked extreme learning machine with generalized correntropy, IEEE Trans. Ind. Inf., 14, 4963, 10.1109/TII.2018.2854549 Chen, 2019, A novel human activity recognition scheme for smart health using multilayer extreme learning machine, IEEE Internet Things J., 6, 1410, 10.1109/JIOT.2018.2856241 Chen, 2018, Mixture correntropy for robust learning, Pattern Recogn., 79, 318, 10.1016/j.patcog.2018.02.010 LeCun, 1995, Convolutional networks for images, speech, and time series Príncipe, 2010 Liu, 2007, Correntropy: properties and applications in non-Gaussian signal processing, IEEE Trans. Signal Process., 55, 5286, 10.1109/TSP.2007.896065 Krizhevsky, 2017, Imagenet classification with deep convolutional neural networks, Commun. ACM, 60, 84, 10.1145/3065386 Maturana, 2015, Voxnet: a 3d convolutional neural network for real-time object recognition, 922 Kim, 2014, Convolutional neural networks for sentence classification, 1746 Yuan, 2014, Droid-sec: deep learning in android malware detection, 371 Kolosnjaji, 2016, Deep learning for classification of malware system call sequences, 137 Pascanu, 2015, Malware classification with recurrent networks, 1916 Dahl, 2013, Large-scale malware classification using random projections and neural networks, 3422 Singh, 2014, The c-loss function for pattern classification, Pattern Recogn., 47, 441, 10.1016/j.patcog.2013.07.017 Lin, 2004, A note on margin-based loss functions in classification, Stat. Probab. Lett., 68, 73, 10.1016/j.spl.2004.03.002 Shankarapani, 2011, Malware detection using assembly and api call sequences, J. Comput. Virol., 7, 107, 10.1007/s11416-010-0141-5 Idika, 2007 Xiao, 2017 Nataraj, 2011, Malware images: visualization and automatic classification, 1