期刊文献+

基于机器学习的Windows环境下恶意程序检测系统 被引量:3

Malware detection system for windows using machine learning
原文传递
导出
摘要 针对Windows环境下恶意程序数量众多且难以判别的情况,为了改善和提高对恶意程序的识别能力和效果,结合程序行为分析和机器学习技术,设计了一个恶意程序的检测系统。通过对所采集的程序样本集进行动态分析,提取出其两类系统调用序列作为样本特征,以此作为输入数据,对机器学习分类器进行监督式学习训练,使其能够对恶意行为和正常行为进行区分,并可以对于未知程序的性质做出判定,可以高效地识别出恶意程序。结果表明,可以通过较短时间的训练即可到达较为满意的判定能力,也表明了机器学习对于程序行为性质判定方面具有广泛的应用前景。 According to the situation of numerous malware in Windows operating system which couldn' t be easily recog- nized, this paper has designed a malware detection system using the program behavior analysis technology and machine learning to improve the recognition ability and effect of malware. Through dynamic analysis of the samples, two kinds of the API (application programming interface ) sequences of the samples have been gotten. As input information, supervised learning has been executed so that the classifier could distinguish malwarc from benign, and the system could get the ability to recognize the quality of unknown programs. As a result, it could identify the malware more effectively. The resuhs showed that after a short period of training, the system had obtained the satisfying ability as well as machine ]earning could be widely used for judging the quality of programs.
出处 《重庆邮电大学学报(自然科学版)》 CSCD 北大核心 2014年第6期778-784,共7页 Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition)
关键词 恶意程序 系统调用 机器学习 分类器 malware system call machine learning classifier
  • 相关文献

参考文献17

  • 1SAHU M, AHIRWAR M, HEMLATA A. A Review of Mal- ware Detection Based on Pattern Matching Technique [ J ]. International Journal of Computer Science and Infor- mation Technologies ,2014,5 ( 1 ) :944-947.
  • 2LO R,LEVITY K Olsson R. MCF:a malicious code filter [ J]. Computer & Security, 1995 ( 14 ) :541-566.
  • 3TESAURO G, KEPHART J Sorkin G. Neural networks for computer virus recognition[ J]. IEEE Expert, 1996(8) :5-6.
  • 4SCHULTZ M, ESKIN E, ZADOK E, et al. Data mining methods for detection of new malicious executables [ C ]// Proceedings of the 2001 IEEE Symposium on Security and Privacy. Oakland, CA : IEEE Computer Society Press,2001:38-49.
  • 5FORREST S, HOFMEYR S A, SOMAYAJI A. Computer immunology[ J ]. Communications of the ACM, 1997,40 (10) :88-96.
  • 6AHMED F, HAMEED H, SHAFIQ Z, et al. Using Spatio- Temporal Information in API Calls with Machine Learning Algorithms for Malware Detection [ C ]//Proceedings of the 2nd ACM Workshop on Artificial Intelligence and Se- curity ( AISec 2009 ). [ s. 1. ] : Conference Publications, 2009:55-62.
  • 7YE Yanfang, WANG Dingding, LI Tao, et al. IMDS: Intel- ligent malware detection system [ C ]//Proceedings of the 13th ACM SIGKDD International Conference on Knowl- edge Discovery and Data Mining( KDD' 07). Piscataway, NJ USA. IEEE Press ,2007 : 1043-1047.
  • 8YE Yanfang,LI Tao, JIANG Qingshan, et al. CIMDS: A- dapting Postprocessing Techniques of Associative Classifi- cation for Malware Detection [ J ]. IEEE Transactions On Systems, Man, And Cybernetics-Part C : Applications And Reviews ,2010,40(3 ) :298-307.
  • 9REDDY D K S, PUJAR1 A K. N-gram analysis for com- puter virus detection [ J ]. Journal in Computer Virology, 2006,2 ( 3 ) : 231-239.
  • 10白金荣,王俊峰,赵宗渠.基于PE静态结构特征的恶意软件检测方法[J].计算机科学,2013,40(1):122-126. 被引量:14

二级参考文献14

共引文献270

同被引文献28

  • 1N Kuzurin , A Shokurov, N Vamovsky and V Zakharnv. On the Concept of Software Obfuscation in Computer Security [ C]. Information Security, 10th International Conference, ISC 2007.Valparafso, Chile, Proceedings,2007, 4779:281-298.
  • 2Q Zhang and D Reeves, Metaaware: Identifying Metamorphic Malware [ C ]. Computer Security Applications Conference, 2007. ACSAC 2007. Twenty-Third Annual, 2007:411-420.
  • 3Schultz M, Eskin E, Zadok F, et al.Data Mining Methods for Detection of New Malicious Executables [J]. IEEE SYMPOSI- UM ON SECURITY AND PRIVACY, 1999, 1(01) : 38-49.
  • 4Schultz M, Eskin E, Zadok F, et al. Data Mining Methods for Detection of New Malicious Executablesl C J. Security and Pri- vacy, 2001. S&P 2001.IEEE,2001:38-49.
  • 5Koher J, Maloof M. Learning to Detect Malicious Executables in the Wildl CI. Proceedings of the 2004 ACM SIGKDD Inter- national Conference on Knowledge Discovery and Data Mining, ACM New York, NY,USA ,2004:470 478.
  • 6SANTOS I, BREZO F, UGARTE-PEDRERO X, et al. Opcode Sequences as Representation of Executables for Data-mining- based Unknown Malware Detection [ J]. Information Sciences, 2013, 231(9): 64-82.
  • 7McGill M, Salton G. Introduction to Modem Information Re- trieval[ M]. McGraw-Hill, 1983:305-306.
  • 8WILLEMS C,HOLZ T,FREILING F. Toward Automated Dy- namic Malware Analysis Using CWSandbox [ J]. IEEE Secur- ity & Privacy Magazine,2007 ,5 (2) : 32-39.
  • 9SALELU Z, SAMI A,GHIASI M. Using Feature Generation from API Calls for Malware Detection [ J ].Computer Fraud & Security, 2014 , 2014 (9): 9-18.
  • 10Rieck K, Trinius P, Willems C, et al. Automatic Analysis of Malware Behavior Using Machine Learning [ J ] . Journal of Computer Security, 2011, 19(4) :639-668.

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部