期刊文献+

一种基于多特征的恶意代码家族静态标注方法 被引量:4

A Static Tagging Method of Malicious Code Family Based on Multi-Feature
下载PDF
导出
摘要 描述了一种基于多特征的恶意代码家族静态标注方法,该方法针对现有技术提取特征单一的缺点,采用恶意代码可视化技术绘制恶意代码图像,并从图像源和文本源、字节码层和操作码层进行特征的提取,多来源多层次地提取特征.为了更好地利用提取自多个层次的特征,设计了3层多分类器联合框架来进行特征的学习,3层多分类器联合框架分为特征组合层、分类层和联合层.最后利用学习到的模型便可以自动进行恶意代码的标注.为了验证方法的有效性,对Microsoft提供的9类恶意代码进行恶意代码家族标注测试实验,实验结果表明,该方法在除了Simda恶意样本家族外,在其他样本家族中的准确率、精确率、召回率和F1-score均高于90%.通过实验证明了该方法的有效性和可靠性. This paper describes a method of static tagging of malicious code family based on multiple features,it uses malicious code visualization technology to draw malicious code image, extracts feature from image source and text source,byte code layer and operation code layer,it extract features from multiple sources'and multi-level which aims at overcoming defects that only extract features from one source.In order to make better use of the features extracted from multiple levels,this paper designs a 3-ldyer multi-classifier joint framework for feature learning, and the 3-layer multi-classifier joint framework is divided into three parts,which are feature combination layer;classification lancer'and union layer.Finally,we can use the learning model to tag the malicious code automatically.In order to verify the validity of the method,we made the malicious code family tagging test experiment with 9 kinds of malicious code in Microsoft's data set, and the experimental results show that our method has higher accuracy,precision,recall and Fl-score which are more than 90% in other sample families except Simda malicious code family. The validity and reliability of the method are proved by experiments.
作者 刘亮 刘露平 何帅 刘嘉勇 Liu Liang;Liu Luping;He Shuai;Liu Jiayong(College of Cybersecurity,Sichuan University,Chengdu 610065;College of Electronics and Information Engineering,Sichuan University,Chengdu 610065)
出处 《信息安全研究》 2018年第4期322-328,共7页 Journal of Information Security Research
基金 CCF-启明星辰鸿雁科研计划基金项目(CCF-VenustechR2017002)
关键词 恶意代码家族 多特征 恶意代码图像 机器学习 多分类器联合框架 malicious code family malicious code image machine learning multi-feature multiclassifier joint framework
  • 相关文献

参考文献3

二级参考文献66

  • 1Microsoft security intelligence report. 2007. http://www.microsoft.com/downloads/details.aspx?FamilylD=4EDE2572-1D39-46EA- 94C6-4851750A2CB0.
  • 2Wang Z, Pierce K, McFarling S. BMAT--A binary matching tool for stale profile propagation. The Journal of Instruction-Level Parallelism, 2000,2:23-43.
  • 3Bayer U, Comparetti PM, Hlauscheck C, Kruegel C, Kirda E. Scalable, behavior-based malware clustering. In: Proc. of the Network and Distributed System Security Symp. (NDSS). San Diego, 2009. http://www.isoc.org/isoc/conferences/ndss/09/ proceedings.shtml.
  • 4Flake H. Structural comparison of executable objects. In: Proc. of the Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2004). 2004.83-97.
  • 5Dullien T, Rolles R. Graph-Based comparison of executable objects (English version). In: Proc. of the SSTIC 2005. 2005. http://www.sstic.org/2005/programme/.
  • 6Rabek JC, Khazan RI, Lewandowski SM, Cunningham RK. Detection of injected, dynamically generated, and obfuscated malicious code. In: Staniford S, Savage S, eds. Proc. of the 2003 ACM Workshop on Rapid Malcode. New York: Association for Computing Machinery, 2003.76-82. [doi: 10.1145/948187.948201].
  • 7Gao DB, Reiter MK, Song D. Binhunt: Automatically finding semantic differences in binary programs. In: Proc. of the Int'l Conf. on Information and Communications Security. Berlin, Heidelberg: Springer-Verlag, 2008. 238-255. [doi: 10.1007/978-3-540- 88625-9].
  • 8Bayer U, Moser A, Kruegel C, Kirda E. Dynamic analysis of malicious code. Journal in Computer Virology, 2006,2(1):67 77. [doi: 10.1007/s11416-006-0012-2].
  • 9Yin H, Song D, Egele M, Kruegel C, Kirda E. Panorama: Capturing system-wide information flow for malware detection and analysis. In: Ning P, ed. Proc. of the 14th ACM Conf. on Computer and Communications Security. New York: Association for Computing Machinery, 2007. 116 -127. [doi: 10.1145/1315245.1315261].
  • 10Bailey M, Oberheide J, Andersen J, Mao ZM, Jahanian F, Nazario J. Automated classification and analysis of internet malware. In: Kruegel C, Lippmann R, Clark A, eds. Proc. of the 10th Int'l Conf. on Recent Advances in Intrusion Detection. Berlin, Heidelberg: Springer-Verlag, 2007. 178-197. [doi: 10.1007/978-3-540-74320-0 10].

共引文献35

同被引文献31

引证文献4

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部