Software Installation Threat Detection Based on Attention Mechanism and Improved Convolutional Neural Network in IOT Platform

Chongwei Liu, Jinlong Pang
{"title":"Software Installation Threat Detection Based on Attention Mechanism and Improved Convolutional Neural Network in IOT Platform","authors":"Chongwei Liu, Jinlong Pang","doi":"10.1088/2631-8695/ad612d","DOIUrl":null,"url":null,"abstract":"\n With of the Internet of Things (IoT) developing and the network technique progressing, malware attacks continue to occur, seriously endangering the information and property security of Internet of Things device users. To ensure the security of the Internet of Things platform and improve the efficiency of malware and vulnerability detection, a software installation threat detection model based on attention mechanism and improved convolutional neural network is constructed. Firstly, the enhanced dynamic symbolic execution module and forward program slicing algorithm are used to extract dynamic features, and then the improved convolutional neural network is utilized to classify malware. In the existing software of IoT devices, the inlining correlation function is studied using the inlining strategy, and the weight between the target pixel and the global pixel is calculated using the attention mechanism, through which the logic and correlation between the triples are correlated. Then, deep residual network is used to detect software vulnerabilities. This enables threat detection before and after software installation. In comparison with the current popular vulnerability detection model experiments, the accuracy, recall rate, accuracy rate and running time of the constructed model in the process of vulnerability detection are 0.975, 0.970, 0.968 and 0.02s, respectively. Compared with other models, the research design model has better performance. This shows that this built model can effectively detect software installation threats, and has high detection accuracy and operation efficiency, which can provide strong support for the Internet of Things platform’s security protection.","PeriodicalId":505725,"journal":{"name":"Engineering Research Express","volume":"101 13","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Engineering Research Express","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1088/2631-8695/ad612d","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

With of the Internet of Things (IoT) developing and the network technique progressing, malware attacks continue to occur, seriously endangering the information and property security of Internet of Things device users. To ensure the security of the Internet of Things platform and improve the efficiency of malware and vulnerability detection, a software installation threat detection model based on attention mechanism and improved convolutional neural network is constructed. Firstly, the enhanced dynamic symbolic execution module and forward program slicing algorithm are used to extract dynamic features, and then the improved convolutional neural network is utilized to classify malware. In the existing software of IoT devices, the inlining correlation function is studied using the inlining strategy, and the weight between the target pixel and the global pixel is calculated using the attention mechanism, through which the logic and correlation between the triples are correlated. Then, deep residual network is used to detect software vulnerabilities. This enables threat detection before and after software installation. In comparison with the current popular vulnerability detection model experiments, the accuracy, recall rate, accuracy rate and running time of the constructed model in the process of vulnerability detection are 0.975, 0.970, 0.968 and 0.02s, respectively. Compared with other models, the research design model has better performance. This shows that this built model can effectively detect software installation threats, and has high detection accuracy and operation efficiency, which can provide strong support for the Internet of Things platform’s security protection.
基于注意力机制和改进型卷积神经网络的物联网平台软件安装威胁检测
随着物联网(IoT)的发展和网络技术的进步,恶意软件攻击不断发生,严重危害了物联网设备用户的信息和财产安全。为了确保物联网平台的安全,提高恶意软件和漏洞检测的效率,本文构建了一种基于注意力机制和改进卷积神经网络的软件安装威胁检测模型。首先利用增强的动态符号执行模块和前向程序切片算法提取动态特征,然后利用改进的卷积神经网络对恶意软件进行分类。在现有的物联网设备软件中,利用内联策略研究内联相关函数,利用注意力机制计算目标像素与全局像素之间的权重,通过权重计算三元组之间的逻辑关系和相关关系。然后,利用深度残差网络检测软件漏洞。这样就能在软件安装前后检测到威胁。与目前流行的漏洞检测模型实验相比,所构建模型在漏洞检测过程中的准确率、召回率、正确率和运行时间分别为 0.975、0.970、0.968 和 0.02s。与其他模型相比,研究设计的模型具有更好的性能。这说明所构建的模型能有效检测软件安装威胁,具有较高的检测精度和运行效率,能为物联网平台的安全防护提供有力支持。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信