期刊文献+

抗混淆的恶意代码图像纹理特征描述方法 被引量:7

Method of anti-confusion texture feature descriptor for malware images
下载PDF
导出
摘要 将图像处理技术与机器学习方法相结合是恶意代码可视化研究的一个新方法。在这种研究方法中,恶意代码灰度图像纹理特征的描述对恶意代码分类结果的准确性影响较大。为此,提出新的恶意代码图像纹理特征描述方法。通过将全局特征(GIST)与局部特征(LBP或dense SIFT)相融合,构造抗混淆、抗干扰的融合特征,解决了在恶意代码灰度图像相似度较高或差异性较大时全局特征分类准确性急剧降低的问题。实验表明,该方法与传统方法相比具有更好的稳定性和适用性,同时在较易混淆的数据集上,分类准确率也有了明显的提高。 It is a new method that uses image processing and machine learning algorithms to classify malware samples in malware visualization field. The texture feature description method has great influence on the result. To solve this problem, a new method was presented that joints global feature of GIST with local features of LBP or dense SIFT in order to construct combinative descriptors of malware gray-scale images. Using those descriptors, the malware classification performance was greatly improved in contrast to traditional method, especially for those samples have higher similarity in the different families, or those have lower similarity in the same family. A lot of experiments show that new method is much more effective and general than traditional method. On the confusing dataset, the accuracy rate of classification has been greatly improved.
作者 刘亚姝 王志海 严寒冰 侯跃然 来煜坤 LIU Yashu;WANG Zhihai;YAN Hanbing;HOU Yueran;LAI Yukun(School of Computer and Information Technology,Beijing Jiaotong University,Beijing 100044,China;School of Electrical and Information Engineering,Beijing University of Civil Engineering and Architecture,Beijing 100044,China;National Computer Network Emergency Response Technical Team/Coordination Center of China,Beijing 100029,China;Institute of Network Technology,Beijing University of Posts and Telecommunication,Beijing 100876,China;School of Computer Science and Informatics,Cardiff University,Cardiff CF24 3AA,UK)
出处 《通信学报》 EI CSCD 北大核心 2018年第11期44-53,共10页 Journal on Communications
基金 国家自然科学基金资助项目(No.U1736218 No.61672086) 国家重点研发计划基金资助项目(No.2018YFB0803604)~~
关键词 恶意代码可视化 图像纹理 特征描述符 恶意代码分类 malware visualization image texture feature descriptors malware classification
  • 相关文献

参考文献3

二级参考文献12

  • 1李勇,左志宏.目标代码混淆技术综述[J].计算机技术与发展,2007,17(4):125-127. 被引量:10
  • 2YIN Heng, SONG D, EGELE M,et al. Panorama : capturing system-wide information flow for malware detection and analysis [ C] //Proc ofthe 14th ACM Conference on Computer and Communications Security.New York: ACM Press, 2007 : 116-127.
  • 3CHRISTODORESCU M,JHA S,SESHIA S al. Semantics-awaremalware detection [ C] //Proc of IEEE Symposium on Security andPrivacy. 2005:32-46.
  • 4PARAMPALLI C,SEKAR R,JOHNON R. A practical mimicry attackagainst powerful system-call monitors [ C] //Proc of ACM Symposiumon Information, Computer and Communications Security. New York:ACM Press,2008:156-167.
  • 5VXHeaven. arg. team. VX Heaven[ EB/OL]. [2013-09-10]. http://vxheaven. org.
  • 6WANG Zheng, PIERCE K, McFSRLING S. BMAT:a binary matc-hing tool for stale profile propagation [ J]. Journal of Instruction-Level Parallelism, 2000(2) :23-43.
  • 7王祥根,司端锋,冯登国,苏璞睿.基于代码覆盖的恶意代码多路径分析方法[J].电子学报,2009,37(4):701-705. 被引量:12
  • 8陈恺,冯登国,苏璞睿.基于延后策略的动态多路径分析方法[J].计算机学报,2010,33(3):493-503. 被引量:9
  • 9孔德光,谭小彬,奚宏生,宫涛,帅建梅.提升多维特征检测迷惑恶意代码[J].软件学报,2011,22(3):522-533. 被引量:17
  • 10傅建明,陶芬,王丹,张焕国.基于对象的软件行为模型[J].软件学报,2011,22(11):2716-2728. 被引量:20

共引文献84

同被引文献33

引证文献7

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部