期刊文献+

基于One-Hot的CNN恶意代码检测技术 被引量:20

CNN MALICIOUS CODE DETECTION TECHNOLOGY BASED ON ONE-HOT
下载PDF
导出
摘要 恶意软件的爆炸性增长,以及对用户机和网络环境造成的严重威胁,逐渐成为了网络空间安全领域的主要矛盾。当前传统的基于特征码的静态扫描技术和基于软件行为的恶意软件检测技术容易产生误报和漏报,渐渐无法满足信息安全领域的新要求。为了解决这些问题,提出基于卷积神经网络CNN的恶意代码检测技术。利用Cuckoo沙箱系统来模拟运行环境并提取分析报告;通过编写Python脚本对分析报告进行预处理;搭建深度学习CNN训练模型来实现对恶意代码的检测,并将其与机器学习以及常见的杀毒软件进行比较。实验结果表明,该方法在相比之下更具有优势,并且取得了较好的检测效果,具有更高的可行性。 The explosive growth of malware every year,as well as the serious threat to the user machine and network environment,has gradually become the main contradiction in the field of network space security.Current traditional static scanning technology based on feature codes and malware detection technology based on software behavior are prone to produce false positives and omissions,which gradually fail to meet the new requirements in the field of information security.In order to solve these problems,malicious code detection technology based on CNN is proposed.Cuckoo sandbox system was used to simulate the running environment and extract the analysis report.Then,we could pre-process the analysis report by writing a Python script.A deep learning CNN training model was built to detect malicious code and compare it with machine learning and common anti-virus software.Experimental results show that this method has more advantages and better detection effect,so it has higher feasibility.
作者 傅依娴 芦天亮 马泽良 Fu Yixian;Lu Tianliang;Ma Zeliang(School of Information Technology and Network Security,People s Public Security University of China,Beijing 100076,China)
出处 《计算机应用与软件》 北大核心 2020年第1期304-308,333,共6页 Computer Applications and Software
基金 国家自然科学基金项目(61602489) “十三五”国家密码发展基金密码理论研究课题(MMJJ20180108) 国家重点研发计划“网络空间安全”重点专项(2016YFB0801100) 中国人民公安大学2019年基本科研业务费重大项目(2019JKF108)
关键词 网络安全 恶意代码 Cuckoo沙箱 CNN Cyber security Malicious code Cuckoo sandbox CNN
  • 相关文献

参考文献4

二级参考文献23

  • 1董志强,肖新光,张栗伟.编码心理学分析病毒同源性[J].信息安全与通信保密,2005(8):55-59. 被引量:9
  • 2瑞星.2013年中国信息安全报告[EB/OL].[2014-03.12].http://www.rising.tom.cn/2013aogao/2013baogao.pdf.
  • 3Park, Younghee.Fast malware classification by automated behavioral graph matching[C]//Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research,2010.
  • 4Kinable J, Kostakis O.Malware classification based on call graph clustering[J].Journal in Computer Virology,2011,7 (4) :233-245.
  • 5Kolter J Z,Maloof M A.Learning to detect and classify malicious executables in the wild[J].The Journal of Machine Learning Research, 2006,7 : 2721-2744.
  • 6Hu X, Chiueh T, Shin K G.Large-scale malware indexing using function-call graphs[C]//Proceedings of the 16th ACM Conference on Computer and Communications Security, 2009 : 611-620.
  • 7Bayer U, Comparetti P M.Scalable, behavior-based malware clustering[C]//NDSS, 2009 : 8-11.
  • 8Flake H.Structural comparison of executable objects[C]// Proceedings of the IEEE Conference on Detection of Intrusions,Malware and Vulnerability Assessment(DIMVA), 2004.
  • 9Dullien T, Rolles R.Graph-based comparison of executable objects(English version) [C]//SSTIC,2005 : 1-3.
  • 10Mandiant.Tracking malware import hashing[EB/OL]. [2014-05-14].https ://www.mandiant.com/blog/tracking-mal- ware-import-hashing.

共引文献34

同被引文献177

引证文献20

二级引证文献42

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部