期刊文献+

基于动态BP神经网络的恶意代码同源性分析 被引量:9

Homology Analysis of Malicious Code Based on Dynamic BP Neural Network
下载PDF
导出
摘要 近年来,随着APT事件的不断曝光,恶意代码的追踪溯源逐渐成为了研究热点.在恶意代码攻击越来越有组织性和目的性的新形势下,定义恶意代码同源性的概念,对现有的恶意代码同源性分析中的特征提取技术进行了分析和总结,根据恶意代码同源性分析的特点,选取了恶意代码多个层次上的关键特征,提出一个基于动态BP神经网络的恶意代码同源性方法.该方法利用动态和静态相结合的方法,提取恶意代码的关键特征并比较不同的样本间这些特征的相似性,以此为输入利用动态BP神经网络算法得到同源性分析结果.实验结果表明,经过实际样本集的训练,该方法能够有效地判别恶意代码之间的同源性. Recently, with the exposure of many advanced persistent threat (APT) events, the trace back of malware is gradually be- coming a research hotspot. Aiming at the situations that the malware attacks are more and more organized and goal-directed,the con- cept of malware homology is defined and the techniques of feature extraction in the existing malicious code homology analysis are analyzed and summarized. According to the characteristics of the homology analysis of malicious code, the key features of the malicious code are selected on multiple levels and a method of malware homology analysis based on dynamic back-propagation ( BP ) neural net-work is put forward. This method extracts the key feature of malicious code from the dynamic and static method and compares these characteristics between different samples. Then this result is inputted to the dynamic back-propagation algorithm to get the homology a- nalysis result. The experiments demonstrate that,with the training of the actual malware samples, the proposed method could estimate the malware homology effectively.
出处 《小型微型计算机系统》 CSCD 北大核心 2016年第11期2527-2531,共5页 Journal of Chinese Computer Systems
基金 国家保密局科研基金项目(BMKY2013B03-1)资助
关键词 恶意代码 追踪溯源 同源性 神经网络 malware trace back homology neural network
  • 相关文献

参考文献2

二级参考文献10

  • 1李勇,左志宏.目标代码混淆技术综述[J].计算机技术与发展,2007,17(4):125-127. 被引量:10
  • 2Derek Bruening, Qin Zhao. Building dynamic instrumentation tools with DynamoRIO [OL]. http.//dynamorio, org/tutori- al. html, 2011.
  • 3Qin Zhao, Derek Bruening, Saman Amarasinghe, et al. Um- bra: Efficient and scalable memory shadowing [C]. Toronto (CA) : Proceedings of the CGO, The 8th International Sympo- sium on Code Generation and Optimization, 2010. 22-31.
  • 4Winnie Cheng, Qin Zhao, Bei Yu, et al. TaintTrace: Effi- cient flow tracing with dynamic binary rewriting [C]. Sardi- nia, Italy: Proceedings. llth IEEE Symposium on Computers and Communications, 2006: 749-754.
  • 5Luk CK, Cohn R, Muth R, et al. Pin: Building customized program analysis tools with dynamic instrumentation [J]. SIG- PLAN Notices, 2005, 40 (6): 190-200.
  • 6Prashanth P Btm~ale, Chi-Keung Luk. PinOS: A programmable framework for whole-system dynamic instrumentation [C]. San Diego, California: Proceedings of the 3rd International Conference on Virtual Execution Environments, 2007: 137-147.
  • 7Nicholas Nethercote, Julian Seward. Valgrind: A framework for heavyweight dynamic binary instrumentation [J]. ACM SIGPLAN Notices, 2007, 42 (6). 89-100.
  • 8Mariam Sensalire, Patrick Ogao, Alexandra Telea, et al. E- valuation of software visualization tools: Lessons learned [C]. Edmonton, Alberta, Canada: 5th IEEE International Work- shop on Visualizing Software for Understanding and Analysis, 2009. 19-26.
  • 9Abslnt Angewandte Informatik GmbH. aiSee graph visualiza tion user manual for Windows and Linux-verslon 3.4. 3 [OL], http.//www, absint, com, 2011.
  • 10周坤,傅德胜.基于Windows Socket的网络数据传输及其安全[J].计算机工程与设计,2007,28(22):5381-5383. 被引量:22

共引文献73

同被引文献79

引证文献9

二级引证文献60

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部