A proposals of convolution neural network system for malicious code analysis based on cloud systems

  • Yong Kyu Park
  • , Kyung Shin Kim
  • , Jang Il Kim
  • , Sung Hee Kim
  • , Kil Hung Lee

Research output: Contribution to journalArticlepeer-review

Abstract

Background/Objectives: In the information security field, artificial intelligence must be applied first. This is because the frequency of malicious code is too high and the processing method is too difficult, which is very difficult for human to handle. Methods/Statistical analysis: In this paper, we developed a program to classify malicious codes into images and a Tensorflow system to classify malicious codes. The malware used as input was the computer virus code used in the BIG 2015 Challenge. This dataset, called a Kaggle dataset, consists of 10,868 bytes of train set. Findings: We used the Tensorflow SLIM library to develop this machine learning malware learning machine. This resulted in more than 80% accuracy. Especially, when the CRIS-Ensemble algorithm was added, the accuracy was 97%. The study of malicious code analysis using machine learning consists of two major parts. First, the process of making the virus into images is important. To classify 10,868 Kaggle malware datasets that the BIG 2015 winner showed 99.6% accuracy, Tensorflow's accuracy and parameter tuning are important, but finding the way to make good images is the most important technique Improvements/Applications: The results show that the malicious code classification system using machine learning can be an effective method to classify malicious code of malicious code by the accuracy of the result and ease of use.

Original languageEnglish
Pages (from-to)80-83
Number of pages4
JournalInternational Journal of Engineering and Technology(UAE)
Volume7
Issue number2
DOIs
StatePublished - 2018

Keywords

  • Convolution neural networks
  • Machine learning
  • Malware code
  • Malware datasets
  • Tensorflow

Fingerprint

Dive into the research topics of 'A proposals of convolution neural network system for malicious code analysis based on cloud systems'. Together they form a unique fingerprint.

Cite this