期刊文献+

基于数据挖掘技术的加壳PE程序识别方法 被引量:1

Classification of packed PE files based on data mining
下载PDF
导出
摘要 恶意代码大量快速的繁衍使得恶意代码自动化检测成为必然趋势,加壳程序识别是恶意代码分析的一个必要步骤。为识别加壳可执行程序,提出一种基于数据挖掘技术的自动化加壳程序识别方法,该方法提取和选取可移植可执行(PE)特征,使用分类算法检测PE文件是否加壳。测试结果表明,在使用J48分类器时加壳文件识别率为98.7%。 The proliferation of malicious code makes automatic malicious code detection an inevitable trend.Packed Portable Executable(PE) files identification is a necessary step of malicious code analysis.The paper presented an automatic identification method based on data mining,through which feature was extracted from PE files.The paper used classification algorithms and selected features to detect packed PE files.The test results show that the identification rate is 98.7% when using J48 classifier.
出处 《计算机应用》 CSCD 北大核心 2011年第7期1901-1903,共3页 journal of Computer Applications
基金 上海市信息安全综合管理技术研究重点实验室开放课题项目(AGK2009004)
关键词 可移植可执行文件分析 加壳识别 数据挖掘 Portable Executable(PE) file analysis packing detection data mining
  • 相关文献

参考文献10

二级参考文献16

  • 1王立威,王潇,常明,封举富.关于二维主成分分析方法的研究[J].自动化学报,2005,31(5):782-787. 被引量:7
  • 2陈伏兵,陈秀宏,王文胜,杨静宇.人脸识别中PCA方法的推广[J].计算机工程与应用,2005,41(34):34-38. 被引量:9
  • 3高全学,潘泉,梁彦,张洪才,程咏梅.基于描述特征的人脸识别研究[J].自动化学报,2006,32(3):386-392. 被引量:13
  • 4[4]Richter J. Programming Applications For Microsoft Windows [M]. Microsoft Press, 2000.
  • 5[5]Schneider B. Applied Cryptography [M]. John Wiley & Sons, 1996.
  • 6[6]Robbins J. Debugging Applications[M]. Microsoft Press, 1999.
  • 7MAXIM A G. On internal representations in face recognition systems [J]. Pattern Recognition, 2000, 33(8) : 1161 - 1177.
  • 8DIETI'ERICH T G. Ensemble methods in machine learning [ C]// Proceeding of First International Workshop on Multiple Classifier Systems. New York: Springer-Verlag, 2000,1- 15.
  • 9HOT K. The random subspace method for constructing decision forests [J]. IEEE Transaction on Pattern Analysis and Machine Intelligence, 1998,20(8) : 832 -844.
  • 10SHARKEY A J C, SHARKEY N E, GERECKE U, et al. The “test and select” approach to ensemble combination [ C]//Lecture Notes in Computer Science 1857. New York: Springer-Verlag, 2000,30 - 44.

共引文献29

同被引文献5

  • 1国家互联网应急中心.CNCERT互联网安全威胁报告[R/OL].[2012-07-23]. http : //www.cert.org.cn/publish/main14 5 /2015 /2015 0728093145715904130/20150728093145715904130_.html.
  • 2LYDA R, HAMROCK J. Using entropy analysis to find encryp- ted and packed malware [J]. IEEE security & privacy, 2007, (2) : 40-45.
  • 3ALDERD. PEiD [DB/OL]. [2013-12-29]. http://www.aldeid.com wiki/PEiD.
  • 4Wikipedia. Euclidean distance [DB/OL]. [2015-07-03]. http:/ en.wikipedia.org/wiki/Euclidean_distance.
  • 5DEVI D, NANDI S. PE file features in detection of packed exe curables [J]. International journal of computer theory and engi neering, 2012, 4(3): 476-478.

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部