Open Access iconOpen Access

ARTICLE

crossmark

Lightweight Malicious Code Classification Method Based on Improved SqueezeNet

by Li Li*, Youran Kong, Qing Zhang

School of Computer and Control Engineering, Northeast Forestry University, Harbin, 150040, China

* Corresponding Author: Li Li. Email: email

Computers, Materials & Continua 2024, 78(1), 551-567. https://doi.org/10.32604/cmc.2023.045512

Abstract

With the growth of the Internet, more and more business is being done online, for example, online offices, online education and so on. While this makes people’s lives more convenient, it also increases the risk of the network being attacked by malicious code. Therefore, it is important to identify malicious codes on computer systems efficiently. However, most of the existing malicious code detection methods have two problems: (1) The ability of the model to extract features is weak, resulting in poor model performance. (2) The large scale of model data leads to difficulties deploying on devices with limited resources. Therefore, this paper proposes a lightweight malicious code identification model Lightweight Malicious Code Classification Method Based on Improved SqueezeNet (LCMISNet). In this paper, the MFire lightweight feature extraction module is constructed by proposing a feature slicing module and a multi-size depthwise separable convolution module. The feature slicing module reduces the number of parameters by grouping features. The multi-size depthwise separable convolution module reduces the number of parameters and enhances the feature extraction capability by replacing the standard convolution with depthwise separable convolution with different convolution kernel sizes. In addition, this paper also proposes a feature splicing module to connect the MFire lightweight feature extraction module based on the feature reuse and constructs the lightweight model LCMISNet. The malicious code recognition accuracy of LCMISNet on the BIG 2015 dataset and the Malimg dataset reaches 98.90% and 99.58%, respectively. It proves that LCMISNet has a powerful malicious code recognition performance. In addition, compared with other network models, LCMISNet has better performance, and a lower number of parameters and computations.

Keywords


Cite This Article

APA Style
Li, L., Kong, Y., Zhang, Q. (2024). Lightweight malicious code classification method based on improved squeezenet. Computers, Materials & Continua, 78(1), 551-567. https://doi.org/10.32604/cmc.2023.045512
Vancouver Style
Li L, Kong Y, Zhang Q. Lightweight malicious code classification method based on improved squeezenet. Comput Mater Contin. 2024;78(1):551-567 https://doi.org/10.32604/cmc.2023.045512
IEEE Style
L. Li, Y. Kong, and Q. Zhang, “Lightweight Malicious Code Classification Method Based on Improved SqueezeNet,” Comput. Mater. Contin., vol. 78, no. 1, pp. 551-567, 2024. https://doi.org/10.32604/cmc.2023.045512



cc Copyright © 2024 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 522

    View

  • 301

    Download

  • 1

    Like

Share Link