期刊文献+

恶意软件鉴别技术及其应用 被引量:3

Malware Identification Technique and its Applications
下载PDF
导出
摘要 随着互联网技术的发展和安全形势的变化,恶意软件的数量呈指数级增长,恶意软件的变种更是层出不穷,传统的鉴别方法已经不能及时有效的处理这种海量数据,这使得以客户端为战场的传统查杀与防御模式不能适应新的安全需求,各大安全厂商开始构建各自的"云安全"计划。在这种大背景下,研究恶意软件检测关键技术是非常必要的。针对恶意软件数量大、变化快、维度高与干扰多的问题,我们研究云计算环境下的软件行为鉴别技术,探讨海量软件样本数据挖掘新方法、事件序列簇类模式挖掘新模型和算法及在恶意软件鉴别中的应用,并构建面向云安全的恶意软件智能鉴别系统原型以及中文钓鱼网站检测系统架构。 With the development of the Internet technology and the changes of the situation of Internet security,we witness exponential increase of the number of malicious software and their endless variants.Traditional detection methods cannot effectively and timely deal with such mass of malicious software data,making traditional anti-virus platform running on PC client cannot satisfy current security requirements any more,thus some major Internet security venders have been launching their 'cloud security' program.Under such background,it is urgent to develop some new effective and efficient techniques for malware detection.In this paper,we investigate malware detection techniques based on cloud computing,including mining massive software samples,and applying new clustering models/algorithms for event sequences into malware detection,to deal with the critical issues of malware as being of large amount,fast change,highdimension and noise-laden.Furthermore,we propose a prototype of intelligent malware detection system for cloud security.
出处 《集成技术》 2012年第1期55-64,共10页 Journal of Integration Technology
基金 国家自然科学基金(面向软件行为鉴别的事件序列挖掘方法研究 NO.61175123) 深圳市生物 互联网 新能源产业发展专项资金(NO.CXB201005250021A)
关键词 恶意软件鉴别 数据挖掘 特征表征 模型构建 分类集成 事件序列挖掘 malicious software identification data mining feature representation model construction classifier ensemble event sequence mining
  • 相关文献

参考文献27

  • 1金山毒霸反恶意软件实验室.2011年中国互联网安全情况整体分析[R],2011.
  • 2Ye Y F,Li T,Zhu S H. Combining file content and file relations for cloud based malware detection[A].2011.222-230.
  • 3Idika N,Mathur A P. A survey of malware detection techniques[R].West Lafayette:Department of Computer Science,Purdue University,2007.3-10.
  • 4国家计算机病毒应急处理中心.2011年中国计算机病毒疫情调查技术分析报告[R],2011.
  • 5Filiol E,Jacob,Liard G. Evaluation methodology and theoretical model for antiviral behavioural[J].Journal in Computer Virology,2006,(01):23-37.
  • 6Oberheide J,Cooke E,Jahanian F. CloudAV:n-version antivirus in the network cloud[A].2008.91-106.
  • 7Ye Y F,Li T,Huang K. Hierarchical associative classifier (HAC) for malware detection from the large and imbalanced gray list[J].Journal of Intelligent Information Systems,2010,(01):1-20.
  • 8Ye Y F,Wang D D,Li T. IMDS:intelligent malware detection system[A].2007.
  • 9Peng H,Long F,Ding C. Feature selection based on mutual information:criteria of max-dependency,max-relevance,and min-redundancy[A].2005.27.
  • 10范明,李川.在FP-树中挖掘频繁模式而不生成条件FP-树[J].计算机研究与发展,2003,40(8):1216-1222. 被引量:56

二级参考文献9

  • 1R Agrawal, R Srikant. Fast algorithms for mining association rules. In: Proc of 1994 Int'l Conf on Very Large Data Bases.Santiago, Chili: VLDB Endowment, 1994. 487--499.
  • 2J S Park, M S Chen, P S Yu. An effective Hash-based algorithm for mining association rules. In: Proc of 1995 ACM-SIGMOD Int'l Cord on Management of Data. San Jose, CA: ACM Press,1995. 175--186.
  • 3S Brin, R Motwani, C Silvemtein. Beyond market basket:Generalizing association rules to correlations. In: Proe of 1997 ACM-SIGMOD Int'l Conf on Management of Data. Tucson, AZ:ACM Press, 1997. 265--276.
  • 4R Agrawal, R Srikant. Mining sequential patterns. In: ICDE'95. Taipei, Taiwan: IEEE Computer Society Press, 1995. 3--14.
  • 5G Dong, J Li. Efficient mining of emerging patterns: Discovering trends and differences. In: Proc of the 5th ACM SIGKDD Int'l Conf on Knowledge Discovery and Data Mining. San Diego, CA:ACM Press, 1999. 43~52.
  • 6J Han, J Pei, Y Yin. Mining frequent patterns without candidate generation. In: Proe of 2000 ACM-SIGMOD Int'l Conf on Management of Data. Dallas, TX: ACM Press, 2000. 1--12.
  • 7Artur Bykowski, Christophe Rigotti. A eondemsed representation to find frequent patterns. In: Proe of the 20th ACM SIGACT-SIGMOD-SIGART Symp on Principles of Database Systems(PODS 2001). Santa Barbara, CA: ACM Press, 2001. 267~273.
  • 8范明 等.数据挖掘:概念与技术[M].北京:机械工业出版社,2001.8.
  • 9郭敏哲,袁津生,王雅超.网络钓鱼Web页面检测算法[J].计算机工程,2008,34(20):161-163. 被引量:8

共引文献62

同被引文献27

引证文献3

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部