2020
DOI: 10.1155/2020/6724513
|View full text |Cite
|
Sign up to set email alerts
|

SLAM: A Malware Detection Method Based on Sliding Local Attention Mechanism

Abstract: Since the number of malware is increasing rapidly, it continuously poses a risk to the field of network security. Attention mechanism has made great progress in the field of natural language processing. At the same time, there are many research studies based on malicious code API, which is also like semantic information. It is a worthy study to apply attention mechanism to API semantics. In this paper, we firstly study the characters of the API execution sequence and classify them into 17 categories. Secondly,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…It interferes with the normal operation of the system but actually lacks the due safety protection capability, or may affect the efficiency, or even refuse service [16]. Take security as a requirement and consider it at the beginning of system development, so that security requirements can be a part of system objectives from the beginning and play a leading role in the process of system development [17,18]. At different levels of the system, different safety control mechanisms are used to implement different precision safety control.…”
Section: Experiments and Analysismentioning
confidence: 99%
“…It interferes with the normal operation of the system but actually lacks the due safety protection capability, or may affect the efficiency, or even refuse service [16]. Take security as a requirement and consider it at the beginning of system development, so that security requirements can be a part of system objectives from the beginning and play a leading role in the process of system development [17,18]. At different levels of the system, different safety control mechanisms are used to implement different precision safety control.…”
Section: Experiments and Analysismentioning
confidence: 99%
“…For example, when detecting SQL injection attacks, models can identify atypical query patterns or structurally abnormal query statements by learning the differences between normal and malicious SQL queries, thereby effectively identifying and blocking SQL injection attacks. Moreover, models can accurately identify attack behaviors in more complex scenarios, such as phishing and malware dissemination, as the attention mechanism dynamically adjusts the model's focus to accurately identify traces of attack behaviors from extensive network communication data [42,43]. For instance, in phishing email detection, models can focus on deceptive vocabulary or sentence structures in email content to effectively identify and intercept phishing emails.…”
Section: Attention Mechanismmentioning
confidence: 99%
“…The ndings show that the model can match the performance of a variety of cutting-edge models that determine if a le is benign or malignant using extracted data, such as API calls [49], which were recovered and turned into a sequence [50]. To reduce False positives and False negatives in the prediction, the majority's knowledge of which characteristics contribute to malware's malignant nature or which sequences are present in all malwares has a fundamental error.…”
Section: C) Comparison Of Performancementioning
confidence: 99%