期刊文献+

基于特征聚类的海量恶意代码在线自动分析模型 被引量:12

Online analytical model of massive malware based on feature clusting
下载PDF
导出
摘要 针对传统海量恶意代码分析方法中自动特征提取能力不足以及家族判定时效性差等问题,通过动静态方法对大量样本行为构成和代码片段分布规律的研究,提出了基于特征聚类的海量恶意代码在线自动分析模型,包括基于API行为和代码片段的特征空间构建方法、自动特征提取算法和基于LSH的近邻聚类算法。实验结果表明该模型具有大规模样本自动特征提取、支持在线数据聚类、家族判定准确率高等优势,依据该模型设计的原型系统实用性较强。 In order to improve the effectiveness and efficiency of mass malicious code analysis, an online analytical model was proposed including feature space construction, automatic feature extraction and fast clustering. Our research focused on the law of malware behavior and code string distribution by dynamic and static techniques. In this model, a sample was described with its API and key code fragment. This model proposed a fast clustering approach to identify group samples that exhibit similar feature when applied this model to real-world malware collections. The result demon- strates that the proposed model is able to extract feature automatically, support streaming data clustering on large-scale, and achieve better precision.
出处 《通信学报》 EI CSCD 北大核心 2013年第8期146-153,共8页 Journal on Communications
基金 国家高技术研究发展计划("863"计划)基金资助项目(2013AA014700) 国家科技支撑计划基金资助项目(2012BAH46B02) 中国科学院战略性科技先导专项基金资助项目(XDA06030200)~~
关键词 恶意代码 在线自动分析 快速聚类 特征提取 malware on-line analytical fast clustering feature extraction
  • 相关文献

参考文献22

  • 1EGELE M, SCHOLTE T, KIRDA E, et al. A survey on automated dynamic malware-analysis techniques and tools[J]. ACM Computing Surveys (CSUR), 2012, 44(2): 1-42.
  • 2KEPHART J O, ARNOLD W C. Automatic extraction of computer virus signatures[A]. Proceedings of the 4th Virus Bulletin Intemational Conference[C] 1994.178-184.
  • 3SATHYANARAYAN V S, KOHLI P, BRUHADESHWAR B. Signa- ture generation and detection of malware families[A]. Information Security and Privacy[C]. Springer Berlin Heidelberg, 2008. 336-349.
  • 4SATISH S, PEREIRA S. Behavioral Signature Generation Using Clustering: WIPO Patent 2011137083[P]. 2011.
  • 5KOLBITSCH C, COMPARETTI P M, KRUEGEL C, et al. Effective and efficient malware detection at the end host[A]. Proceedings of the 18th Conference on USENIX Security Symposium USENIX Association[C]. 2009.351-366.
  • 6RAMACHANDRAN A, FEAMSTER N. Understanding the network-level behavior of spammers[J]. ACM Sigcomm Computer Communication Review, 2006, 36(4):291-302.
  • 7INOUE D, YOSHIOKA K, ETO M, et al. Malware behavior analysis in isolated miniature network for revealing malware's network activity[A]. IEEE International Conference on Communications[C]. 2008. 1715-1721.
  • 8MORALES J A, AL-BATAINEH A, XU S, et al. Analyzing and exploiting network Communication 20-34. behaviors of malware[A]. Security and Privacy in Networks[C]. Springer Berlin Heidelberg, 2010.
  • 9PERDISCI R, LEE W, FEAMSTER N. Behavioral clustering of HTTP-based malware and signature generation using malicious net- work traces[A]. Proceedings of the 7th USENIX Conference on Net- worked Systems Design and Implementation USENIX Association[C]. 2010.26-26.
  • 10RIECK K, HOLZ T, WILLEMS C, et al. Learning and classification of malware behavior[A]. Detection of Intrusions and Malware, and Vulnerability Assessment[C]. Springer Berlin Heidelberg, 2008. 108-125.

同被引文献196

引证文献12

二级引证文献140

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部