期刊文献+

基于NE-VASVM的JavaScript恶意代码检测系统 被引量:1

JavaScript malicious code detection system based on NE-VASVM
下载PDF
导出
摘要 针对传统的JavaScript恶意代码静态检测所存在的样本标记工作量大,以及由于样本冗余度高、泛化能力不足所导致的分类精确度低的问题,提出了一种新的支持向量机的自主学习策略VASVM,通过价值度量的定义优化了最有价值样本的选择策略,同时结合迭代地调整训练集平衡度,提高了训练集泛化能力和训练过程的收敛速度。然后在此基础上利用NE-SVM算法对采用VASVM所选择的训练集进行剪裁以降低样本冗余度,并且进一步提高了泛化能力。最后得到了基于VASVM策略和NE-SVM算法所结合形成的NE-VASVM系统。实验结果表明,基于NE-VASVM的JavaScript恶意代码检测系统有效减少了人工标记工作量,提高了分类器精度。 Aiming at the problem that the traditional JavaScript malicious code static detection has a large workload of sample tags,and because of high sample redundancy,insufficient generalization ability and low classification accuracy,a new support vector machine is proposed.The self-learning strategy VASVM optimizes the selection strategy of the most valuable samples through the definition of value metrics.At the same time,it adjusts the balance of the training set iteratively,which improves the generalization ability of the training set and the convergence speed of the training process.Then based on this,the NE-SVM algorithm is used to tailor the training set selected by VASVM to reduce the sample redundancy and further improve the generalization ability.Finally,the NE-VASVM system based on VASVM strategy and NE-SVM algorithm is obtained.The experimental results show that the JavaScript malicious code detection system based on NE-VASVM effectively reduces the workload of manual marking and improves the accuracy of the classifier.
作者 管衡 李麟俊 张琳 GUAN Heng;LI Linjun;ZHANG Lin(School of Computer Science,Nanjing University of Posts and Telecommunications,Nanjing 210023,China;Department Traffic Police Coqjs,Jiangsu Provincial Public Security,Nanjing 210049,China)
出处 《南京邮电大学学报(自然科学版)》 北大核心 2019年第3期82-90,共9页 Journal of Nanjing University of Posts and Telecommunications:Natural Science Edition
基金 国家自然科学基金(61402241) 江苏省高校自然科学研究项目(17KJB520026) 南京邮电大学校级科研基金(NY217050)资助项目
关键词 支持向量机 主动学习 价值度量 训练集剪裁 support vector machines(SVM) active learning value measure training set tailoring
  • 相关文献

参考文献6

二级参考文献78

  • 1诸葛建伟,王大为,陈昱,叶志远,邹维.基于D-S证据理论的网络异常检测方法[J].软件学报,2006,17(3):463-471. 被引量:54
  • 2李洋,方滨兴,郭莉,田志宏.基于主动学习和TCM-KNN方法的有指导入侵检测技术[J].计算机学报,2007,30(8):1464-1473. 被引量:31
  • 3Bykova M,Ostermann S,Tjaden B.Detecting network intrusions via a statistical analysis of network packet characteristics//Proceedings of the 33rd Southeastern Symposium on System Theory.Ohio,Athens,2001:309-314
  • 4Lee W,Stolfo S J.A framework for constructing features and models for intrusion detection systems.ACM Transactions on Information and System Security(TISSEC),2000,3(4):227-261
  • 5Barbarra D,Couto J,Jajodia S,Popyack L,Wu N.ADAM:Detecting intrusions by data mining//Proceedings of the 2001IEEE,Workshop on Information Assurance and Security.West Point,NY,USA,2001:11-16
  • 6Tamas A.IDDM:Intrusion detection using data mining techniques.Salisbury,Australia:DSTO Electronics and Surveillance Research Laboratory:Technical Report DSTO-GD-0286,2001
  • 7Luo J,Bridges S M.Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection.International Journal of Intelligent Systems,2000,15(8):687-704
  • 8Lippmann R P,Cunningham R K.Improving intrusion detection performance using keyword selection and neural networks.Computer Networks,2000,34(4):597-603
  • 9Eskin E,Arnold A,Prerau M,Portnoy L,Stolfo S P.A geometric framework for unsupervised anomaly detection:Detecting intrusions in unlabeled data//Barbara D,Jajodia S eds.Applications of Data Mining in Computer Security.Boston:Kluwer Academic Publishers,2002:78-99
  • 10Mukkamala S,Janoski G,Sung A H.Intrusion detection:Support vector machines and neural networks//Proceedings of the IEEE International Joint Conference on Neural Networks.Honolulu,USA,2002:1702-1707

共引文献137

同被引文献6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部