Towards improving detection performance for malware with a correntropy-based deep learning method

来源 :数字通信与网络(英文版) | 被引量 : 0次 | 上传用户:july1126
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
With the rapid development of Internet of Things (IoT) technologies,the detection and analysis of malware have become a matter of concern in the industrial application of Cyber-Physical System (CPS) that provides various services using the IoT paradigm.Currently,many advanced machine learning methods such as deep learning are popular in the research of malware detection and analysis,and some achievements have been made so far.However,there are also some problems.For example,considering the noise and outliers in the existing datasets of malware,some methods are not robust enough.Therefore,the accuracy of malware classification still needs to be improved.Aiming at this issue,we propose a novel method that combines the conrentropy and the deep learning model.In our proposed method for malware detection and analysis,given the success of the mixture correntropy as an effective similarity measure in addressing complex datasets with noise,it is therefore incorporated into a popular deep learning model,i.e.,Convolutional Neural Network (CNN),to reconstruct its loss function,with the purpose of further detecting the features of outliers.We present the detailed design process of our method.Furthermore,the proposed method is tested both on a real-world malware dataset and a popular benchnark dataset to verify its learning performance.
其他文献
The Intemet of Things (IoT) is increasingly deployed to enable smart applications.Various types of data are accumulated continuously during the running of these applications.Managing and using these IoT data to derive intelligence for making the smart wor
期刊
The massive number of sensors deployed in the Internet of Things (IoT) produce gigantic amounts of data for facilitating a wide range of applications.Deep Learning (DL) would undoubtedly play a role in generating valuable inferences from this massive volu
Internet of Things (IoT) devices facilitate intelligent service delivery in a broad range of settings,such as smart offices,homes and cities.However,the existing IoT access control solutions are mainly based on conventional identity management schemes and
Many large-scale and complex structural components are applied in the aeronautics and automobile industries.However,the repeated alternating or cyclic loads in service tend to cause unexpected fatigue fractures.Therefore,developing real-time and visible m
For future wireless communication systems,Power Domain Non-Orthogonal Multiple Access (PD-NOMA) using an advanced receiver has been considered as a promising radio access technology candidate.Power allocation plays an important role in the PD-NOMA system
Robots,as the creation of humans,became an irreplaceable component in human society.With the advancement of technologies,robots have become more and more intelligent and have been widely used in many fields,such as disease diagnosis,customer services,heal
In recent years,with the development of the social Internet of Things (IoT),all kinds of data accumulated on the network.These data,which contain a lot of social information and opinions.However,these data are rarely fully analyzed,which is a major obstac
Online social media networks are gaining attention worldwide,with an increasing number of people relying on them to connect,communicate and share their daily pertinent event-related information.Event detection is now increasingly leveraging online social
A Trunk Line Based Geographic Routing(TLBGR) protocol in Vehicular Ad-hoc Networks (VANETs) is proposed in this paper to solve the problem of data acquisition in the traditional trunk coordinated control system.Because of the characteristics of short comm
The single planar routing protocol has a slow convergence rate in the large-scale Wireless Sensor Network (WSN).Although the hierarchical routing protocol can effectively cope with large-scale application scenarios,how to elect a secure cluster head and b