2020
DOI: 10.3390/app10072373
|View full text |Cite
|
Sign up to set email alerts
|

Investigation of Dual-Flow Deep Learning Models LSTM-FCN and GRU-FCN Efficiency against Single-Flow CNN Models for the Host-Based Intrusion and Malware Detection Task on Univariate Times Series Data

Abstract: Intrusion and malware detection tasks on a host level are a critical part of the overall information security infrastructure of a modern enterprise. While classical host-based intrusion detection systems (HIDS) and antivirus (AV) approaches are based on change monitoring of critical files and malware signatures, respectively, some recent research, utilizing relatively vanilla deep learning (DL) methods, has demonstrated promising anomaly-based detection results that already have practical applicability due low… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
15
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(17 citation statements)
references
References 67 publications
2
15
0
Order By: Relevance
“…Deep learning is generally time-consuming, but it has proven to be more efficient in malware detection. Known malware analysis methods based on deep learning include CNN [27], deep belief network (DBN) [28], graph convolutional network (GCN) [29], long short-term memory (LSTM), gated recurrent unit (GRU) [30], and VGG16 [31]. For example, Lee et al [24] discussed how to use deep learning to analyze malware.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Deep learning is generally time-consuming, but it has proven to be more efficient in malware detection. Known malware analysis methods based on deep learning include CNN [27], deep belief network (DBN) [28], graph convolutional network (GCN) [29], long short-term memory (LSTM), gated recurrent unit (GRU) [30], and VGG16 [31]. For example, Lee et al [24] discussed how to use deep learning to analyze malware.…”
Section: Related Workmentioning
confidence: 99%
“…Pei et al [29] proposed a deep learning framework to learn embedding representations for Android malware detection, which included graph convolutional networks (GCNs) to learn semantic and sequential patterns, and an independently recurrent neural network (In-dRNN) to learn deep semantic information and extract context-dependent features for malware recognition. Čeponis and Goranin [30] suggested using dual-flow deep learning methods-such as a long short-term memory fully convolutional network (LSTM-FCN) and a gated recurrent unit (GRU)-FCN for malware recognition-and performed experiments on the Windows OS calls traces dataset (AWSCTD) but achieved best results with conventional one-dimension single flow CNN.…”
Section: Related Workmentioning
confidence: 99%
“…The applicability of some more complex, dual-flow Deep Learning models, such as long short-term memory fully convolutional network (LSTM-FCN) 31 and GRU-FCN 32 is investigated by Ceponis and Goranin. 33 Compared to more simple models, which are more efficient in training and testing times, they are not producing better results. A relatively simple CNN solution with a static value of kernels parameter performed the best among the models considered, while a CNN-GRU model had the best False Positive Rate.…”
Section: Recent Developmentsmentioning
confidence: 99%
“…DBNs are used as an auto encoder for feature extraction to detect malware. Vasan et al [33] used handcrafted features as well as those of VGG16 and ResNet-50 CNNs to perform image-based malware classification.Čeponis and Goranin [34] analyzed the use of dual-flow deep learning methods, such as gated recurrent unit fully convolutional network (GRU-FCN) vs single-flow convolutional neural network (CNN) models for detection of malware signatures.…”
Section: Related Workmentioning
confidence: 99%