Abstract
Cyberattacks are often difficult to identify with traditional signature-based detection, because attackers continually find ways to bypass the detection methods. Therefore, researchers have introduced artificial intelligence (AI) technology for cybersecurity analysis to detect malicious PowerShell scripts. In this paper, we propose a feature optimization technique for AI-based approaches to enhance the accuracy of malicious PowerShell script detection. We statically analyze the PowerShell script and preprocess it with a method based on the tokens and abstract syntax tree (AST) for feature selection. Here, tokens and AST represent the vocabulary and structure of the PowerShell script, respectively. Performance evaluations with optimized features yield detection rates of 98% in both machine learning (ML) and deep learning (DL) experiments. Among them, the ML model with the 3-gram of selected five tokens and the DL model with experiments based on the AST 3-gram deliver the best performance.
| Original language | English |
|---|---|
| Pages (from-to) | 549-560 |
| Number of pages | 12 |
| Journal | ETRI Journal |
| Volume | 43 |
| Issue number | 3 |
| DOIs | |
| State | Published - 2021.06 |
Keywords
- Deep learning
- feature optimization
- fileless malware
- machine learning
- PowerShell script
Quacquarelli Symonds(QS) Subject Topics
- Materials Science
- Computer Science & Information Systems
- Engineering - Electrical & Electronic
- Engineering - Petroleum
Fingerprint
Dive into the research topics of 'Evaluations of AI-based malicious PowerShell detection with feature optimizations'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver