Open Access Open Access  Restricted Access Subscription Access

An Artificial Intelligence Method to Predict Malicious Behavior

Der-Chen Huang,
Chun-Fang Hsiao,
Bo-Kai Liu,
Yu-Yi Chen,

Abstract


With the advancement of technology, more and more information equipment appear in people’s lives. Up to date, with the improvement of network technology, the transmission of information between devices has become more convenient and faster, and the worries of information security follow. Although discussion of the information security of terminal equipment can be an issue, the information of terminal equipment will eventually be sent back to the server. Therefore, the research of the intrusion detection of servers is more fundamental. It is well known that the appearance of malicious behavior often means that the system may have been attacked by hackers. Thus, early detection of malicious behavior plays a vital role in preventing hackers from intrusion. However, most of the current known researches tend to focus only on how the system recognizes the malicious behavior when it is occurred, but the system cannot predict the occurrence in advance when the malicious behavior has not been completed. This research hopes to propose a method that can predict the appearance of malicious behavior before the malicious behavior is completed. We propose a method for predicting malicious behavior, which can determine whether the behavior is malicious before it is completed. The method of this research is to construct a malicious behavior prediction model by GAN (Generative Adversarial Network). It is based on the malicious behavior detection model established by the LSTM (Long Short-Term Memory) model. The experimental results show that the prediction accuracy of the model is about 83%.

Keywords


Host-Based Intrusion Detection System, Long Short-Term Memory, Generative Adversarial Network

Citation Format:
Der-Chen Huang, Chun-Fang Hsiao, Bo-Kai Liu, Yu-Yi Chen, "An Artificial Intelligence Method to Predict Malicious Behavior," Journal of Internet Technology, vol. 26, no. 2 , pp. 219-230, Mar. 2025.

Full Text:

PDF

Refbacks

  • There are currently no refbacks.





Published by Executive Committee, Taiwan Academic Network, Ministry of Education, Taipei, Taiwan, R.O.C
JIT Editorial Office, Office of Library and Information Services, National Dong Hwa University
No. 1, Sec. 2, Da Hsueh Rd., Shoufeng, Hualien 974301, Taiwan, R.O.C.
Tel: +886-3-931-7314  E-mail: jit.editorial@gmail.com