期刊文献+

局域网恶意代码入侵过程的痕迹数据监测仿真 被引量:1

Trace Data Monitoring Simulation of LAN Malicious Code Intrusion Process
下载PDF
导出
摘要 当前方法在监测局域网恶意代码入侵过程的痕迹数据时,由于受提取的数据特征数目影响导致监测准确率和监测率不高。提出基于人工生物免疫的局域网恶意代码入侵痕迹数据监测方法,采用加权处理的信息增益特征提取方法提取局域网恶意代码入侵过程的痕迹数据信息增益和特征频率。将提取的数据特征编码后存储在云空间中,通过模拟人工生物免疫过程,生成局域网恶意代码入侵痕迹数据特征监测装置集合,通过调节克隆系数和增加柯西变异步长因子对监测装置集合做优化处理生成新的监测装置,利用该装置和加权评分法判断局域网未知数据样本的恶意系数,根据其与恶意系数阈值大小判定样本中是否含有恶意代码入侵痕迹数据。实验结果表明,所提方法具有较高的监测准确率和监测率,且在提取特征数目小于800个时监测效果最佳。 A method for monitoring the malicious code intrusion trace data of local area network based on artificial biological immunity was proposed.Firstly,the weighted method of information gain feature extraction was used to ex-tract the trace data information gain and feature frequency of local area network malicious code intrusion process.Sec-ondly,the extracted data features were encoded and stored in the cloud space.Through simulating the artificial bio-logical immune process,the monitoring device set of local area malicious code intrusion trace data feature was genera-ted.By adjusting the cloning coefficient and increasing the Cauchy mutation step length factor,the monitoring device set was optimized to generate a new monitoring device.Moreover,this device and the weighted scoring method were used to judge the malicious coefficient of unknown data sample in local area network.Finally,the malicious coeffi-cient and the threshold value of malicious coefficient were used to determine whether sample contained malicious code intrusion trace data.Simulation results show that the proposed method has higher monitoring accuracy and monitoring rate.Meanwhile,the monitoring effect is best when the number of extracted features is less than 800.
作者 毛养红 程学军 MAO Yang-hong;CHENG Xue-jun(South China Institute of Software Engineering,Guangzhou University,Guangzhou Guangdong 510990,China;Luohe Institute of Technology,Henan University of Technology,Luohe Henan 462002,China)
出处 《计算机仿真》 北大核心 2020年第1期263-266,271,共5页 Computer Simulation
关键词 局域网 恶意代码 入侵 痕迹数据 监测 Local area network Malicious code Intrusion Trace data Monitor
  • 相关文献

参考文献10

二级参考文献47

  • 1严萍,史旦旦,钱能.计算机信息安全交换系统的设计[J].浙江工业大学学报,2004,32(4):383-387. 被引量:2
  • 2金然,魏强,王清贤.基于分支序列距离的恶意代码分类[J].计算机研究与发展,2007,44(z2):52-57. 被引量:4
  • 3赵刚,宫义山,王大力.考虑成本与要素关系的信息安全风险分析模型[J].沈阳工业大学学报,2015,37(1):69-74. 被引量:8
  • 4360互联网安全中心.2012年中国互联网安全报告[EB/OL].北京:360互联网安全中心,2013(2013-02-25)[2015-04-30].http://awuvsvkkjf.l5.yunpan.cn/lk/QUPZKyLbVTBTH.
  • 5Ding Y X,Yuan X B,Tang K,et al.A fast malware detection algorithm based on objective-oriented associa-tion mining[J].Computers &Security,2013,39:315-324.
  • 6Silvio C,Yang X,Zhou W L.Control flow-based malware variant detection[J].IEEE Transactions on Dependable and Secure Computing,2014,11(4):304-317.
  • 7Kolter J Z,Marcus A.Learning to detect malicious executables in the wild[C]//Knowledge Discovery and Data Mining.New York,USA,2004:470-478.
  • 8Nissim N,Robert M,Lior R,et al.Novel active learning methods for enhanced PC malware detection in windows OS[J].Expert Systems with Applications,2014,41(13):5843-5857.
  • 9Bai J R,Wang J F,Zou G Z.A malware detection scheme based on mining format information[J].The Scientific World Journal,2014,15(2):1-11.
  • 10Zhang M,Anand R,Niraj K.A defense framework against malware and vulnerability exploits[J].International Journal of Information Security,2014,13(5):439-452.

共引文献72

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部