iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1155/2021/8381550
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T05:10:48Z","timestamp":1710393048078},"reference-count":13,"publisher":"Hindawi Limited","license":[{"start":{"date-parts":[[2021,9,11]],"date-time":"2021-09-11T00:00:00Z","timestamp":1631318400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Scientific Programming"],"published-print":{"date-parts":[[2021,9,11]]},"abstract":"The Internet of Things (IoT), cloud, and fog computing paradigms provide a powerful large-scale computing infrastructure for a variety of data and computation-intensive applications. These cutting-edge computing infrastructures, however, are nevertheless vulnerable to serious security and privacy risks. One of the most important countermeasures against cybersecurity threats is intrusion detection and prevention systems, which monitor devices, networks, and systems for malicious activity and policy violations. The detection and prevention systems range from antivirus software to hierarchical systems that monitor the traffic of whole backbone networks. At the moment, the primary defensive solutions are based on malware feature extraction. Most known feature extraction algorithms use byte N-gram patterns or binary strings to represent log files or other static information. The information taken from program files is expressed using word embedding (GloVe) and a new feature extraction method proposed in this article. As a result, the relevant vector space model (VSM) will incorporate more information about unknown programs. We utilize convolutional neural network (CNN) to analyze the feature maps represented by word embedding and apply Softmax to fit the probability of a malicious program. Eventually, we consider a program to be malicious if the probability is greater than 0.5; otherwise, it is a benign program. Experimental result shows that our approach achieves a level of accuracy higher than 98%.<\/jats:p>","DOI":"10.1155\/2021\/8381550","type":"journal-article","created":{"date-parts":[[2021,9,13]],"date-time":"2021-09-13T22:51:25Z","timestamp":1631573485000},"page":"1-7","source":"Crossref","is-referenced-by-count":2,"title":["Malware Detection Using CNN via Word Embedding in Cloud Computing Infrastructure"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-5368-1829","authenticated-orcid":true,"given":"Rong","family":"Wang","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Xidian University, Xi\u2019an 710000, China"}]},{"given":"Cong","family":"Tian","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Xidian University, Xi\u2019an 710000, China"}]},{"given":"Lin","family":"Yan","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Xidian University, Xi\u2019an 710000, China"}]}],"member":"98","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/wicom.2010.5601291"},{"key":"2","article-title":"Crowdroid:behavior-based malware detection system for android","author":"I. Burguera"},{"issue":"6","key":"3","article-title":"Analysis of signature-based and behavior-based anti-malware approaches","volume":"2","author":"A. Mujumdar","year":"2013","journal-title":"International Journal of Advanced Research in Computer Engineering and Technology"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/d14-1162"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ctc.2010.8"},{"key":"6","first-page":"1212","article-title":"Malware detection via api calls, topic models and machine learning","author":"G. G. Sundarkumar"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/eiconrus.2017.7910580"},{"issue":"2","key":"8","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1049\/iet-ifs.2017.0430","article-title":"Malware classification based on api calls and behaviour analysis","volume":"12","author":"A. Pektas","year":"2018","journal-title":"IET Information Security"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1108\/eb026526"},{"key":"10","first-page":"34","article-title":"Web document clustering and ranking using tf-idf based apriori approach","author":"R. K. Roul","year":"2014"},{"key":"11","first-page":"49","article-title":"A research on text classification method based on improved TF-IDF algorithm","volume-title":"Journal of Guangdong University of Technology","author":"K. D. He","year":"2016"},{"key":"12","first-page":"20","article-title":"Words similarity algorithm based on improved TF-IDF and cosine theorem","author":"J. F. Zhang","year":"2017","journal-title":"Modern Computer"},{"issue":"23","key":"13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11042-018-6212-1","article-title":"Exploiting Tf-Idf In Deep Convolutional Neural Networks For Content Based Image Retrieval","volume":"77","author":"N. Kondylidis","year":"2018","journal-title":"Multimedia Tools and Applications"}],"container-title":["Scientific Programming"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/sp\/2021\/8381550.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/sp\/2021\/8381550.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/sp\/2021\/8381550.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,13]],"date-time":"2021-09-13T22:51:31Z","timestamp":1631573491000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/sp\/2021\/8381550\/"}},"subtitle":[],"editor":[{"given":"Punit","family":"Gupta","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,9,11]]},"references-count":13,"alternative-id":["8381550","8381550"],"URL":"https:\/\/doi.org\/10.1155\/2021\/8381550","relation":{},"ISSN":["1875-919X","1058-9244"],"issn-type":[{"value":"1875-919X","type":"electronic"},{"value":"1058-9244","type":"print"}],"subject":[],"published":{"date-parts":[[2021,9,11]]}}}