期刊文献+

深度信念网络的恶意代码分类策略研究 被引量:5

Research Strategy of Classify Malicious Code into Families on the Method of Deep Belief Networks
下载PDF
导出
摘要 恶意代码的分类是恶意代码分析领域研究的重要问题之一.为解决这一问题,提出深度信念网络(Deep Belief Netw orks,DBN)的恶意代码分类策略.首先,从样本集中提取恶意代码图像特征、指令语句中的频度特征;其次,为确保准确率的提高,将上述两类特征进行融合,训练深度信念网络模型中的限制玻尔兹曼机(Restricted Boltzmann Machine,RBM)和反向传导算法(Back Propagation,BP).实验结果表明,提出的深度信念网络模型对恶意代码的分类平均准确率可达95.7%,明显高于传统浅层机器学习模型KNN的94.5%. The classification of malicious code is one of the most important issues in the field of malicious code analysis. To solve this problem,the Deep Belief Networks( DBN) malicious code classification strategy is proposed. Firstly,extract the characteristics of malicious code images from the sample set and the frequency characteristics in the instruction statement. Secondly,to ensure the improvement of accuracy,combine the two kinds of features above,to train Boltzmann Machine,( RBM) and Back Propagation( BP). The experimental results show that the average accuracy rate of the proposed model is 95. 7%,which is significantly higher than that of the traditional shallow machine learning model KNN's 94. 5%.
出处 《小型微型计算机系统》 CSCD 北大核心 2017年第11期2465-2470,共6页 Journal of Chinese Computer Systems
基金 新疆自治区科技人才培养项目(QN2016YX0051)资助 国家社会科学基金项目(12CFX053)资助 2013年度湖北省教育厅科学研究计划项目(B2013041)资助
关键词 深度信念网络 恶意代码 限制玻尔兹曼机 分类 deep belief networks malicious code restricted boltzmann machine classify
  • 相关文献

参考文献3

二级参考文献21

  • 1李勇,左志宏.目标代码混淆技术综述[J].计算机技术与发展,2007,17(4):125-127. 被引量:10
  • 2中国互联网络信息中心.第26次中国互联网络发展状况统计报告[R].北京,2010-07.
  • 3YAN Wei, WU E. Toward Automatic Discovery of Malware Signature for Anti-Virus Cloud Computing[ C ]//ICST Lecture Notes of the In- stitute for Computer Sciences, Social Informatics and Telecommuni- cations Engineering, Complex Sciences. Heidelberg Berlin : Springer, 2009:724 - 728.
  • 4CARBONE A, CASTELLIA G, STANLEY H E. Time-dependent Hurst exponent in financial time series [ J ]. Physica A : Statistical Mechanics and its Applications,2004,344 ( 1 ) : 267 - 271.
  • 5BECCHI M. From Poisson Processes to Self-Similarity:A Survey of Network Traffic Models[ R]. Citeseer,2008 : 1 - 13.
  • 6MANDELBROT B B. Limit Theorems on the Self-Normalized Range for Weakly and Strongly Dependent Processes [ J ]. Probability Theo- ry and Related Fields,1975,31 (4) :271 -285.
  • 7ADLER R J,FELDMAN R E,TAQQU M S. A practical guide to heavy tails: Statistical techniques and applications [ M ]. Switzer- land: Birkhauser, 1998 : 186 - 218.
  • 8TAQQU M S, TEVEROVSKY V, WILLINGER W. Estimators for Long-Range Dependence:An Empirical Study [ J ]. Fractals, 1995,3 (4) :785 -788.
  • 9Apimonitor. Win32 API monitor[ EB/OL]. http://www, apimoni- tor. com/.
  • 10Desnos A. Android: Static analysis using similarity distance [C] //Proc of the 45th Hawaii Int Conf on System Sciences (HICSS). Los Alamitos, CA~ IEEE Computer Society, 2012:5394-5403.

共引文献79

同被引文献18

引证文献5

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部