期刊文献+

基于系统调用和数据溯源的PDF文档检测模型 被引量:1

PDF document detection model based on system calls and data provenance
下载PDF
导出
摘要 针对传统静态检测及动态检测方法无法应对基于大量混淆及未知技术的PDF文档攻击的缺陷,提出了一个基于系统调用和数据溯源技术的新型检测模型NtProvenancer。首先,使用系统调用捕获工具收集文档执行时产生的系统调用记录;其次,利用数据溯源技术构建基于系统调用的数据溯源图;而后,用图的路径筛选算法提取系统调用特征片段进行检测。实验数据集由528个良性PDF文档与320个恶意PDF文档组成。在Adobe Reader上展开测试,并使用词频-逆文档频率(TF-IDF)及PROVDETECTOR稀有度算法替换所提出的图的关键点算法来进行对比实验。结果表明NtProvenancer在精确率和F1分数等多项指标上均优于对比模型。在最佳参数设置下,所提模型的文档训练与检测阶段的平均用时分别为251.51 ms以及60.55 ms,同时误报率低于5.22%,F1分数达到0.989。可见NtProvenancer是一种高效实用的PDF文档检测模型。 Focused on the issue that the traditional static detection and dynamic detection methods cannot cope with malicious PDF document attacks using a lot of obfuscation and unknown technologies,a new detection model based on system calls and data provenance,called NtProvenancer,was proposed.Firstly,the system call records during execution of the document were collected by the system call tracing tool.Then,the data provenance technology was used to establish a data provenance graph based on the system calls.After that,the feature segments of system calls were extracted for detection by using the key point algorithm of the graph.The experimental dataset consists of 528 benign PDF documents and 320 malicious ones.The test was carried out on Adobe Reader,and the Term Frequency-Inverse Document Frequency(TF-IDF)and the rarity algorithm in PROVDETECTOR were used to replace the key point algorithm of the graph to conduct the comparative study.The results show that NtProvenancer has better performance on precision and F1 score.Under the optimal parameter setting,the proposed model has the average time of document training and detection stages of 251.51 ms and 60.55 ms respectively,the false alarm rate lower than 5.22%,and the F1 score reached 0.989,showing that NtProvenancer is an efficient and practical model for PDF document detection.
作者 雷靖玮 伊鹏 陈祥 王亮 毛明 LEI Jingwei;YI Peng;CHEN Xiang;WANG Liang;MAO Ming(Information Engineering University,Zhengzhou Henan 450001,China)
出处 《计算机应用》 CSCD 北大核心 2022年第12期3831-3840,共10页 journal of Computer Applications
基金 国防科技创新特区项目。
关键词 PDF文档检测 系统调用 数据溯源 关键点算法 特征片段 PDF document detection system call data provenance key point algorithm feature segment
  • 相关文献

参考文献3

二级参考文献27

  • 1穆祥昆,王劲松,薛羽丰,黄玮.基于活跃熵的网络异常流量检测方法[J].通信学报,2013,34(S2):51-57. 被引量:20
  • 2OWASP.Cross-site scripting(XSS)[EB/OL].(2014-04-22).[2015-04-07].https://www.owasp.org/index.php/XSS.
  • 3Meyerovich L A,Livshits B.Conscript:Specifying and enforcing fine-grained security policies for JavaScript in the browser[C]//Proceedings of the 31st IEEE Symposium on Security and Privacy(SP).Piscataway,NJ,USA:IEEE Press,2010:481-496.
  • 4Weinberger J,Barth A,Song D.Towards client-side HTML security policies[C]//Proceedings of the 6th USENIX Conference on Hot Topics in Security.Berkeley,CA,USA:USENIX Association,2011.
  • 5Saxena P,Molnar D,Livshits B.SCRIPTGARD:Automatic context-sensitive sanitization for large-scale legacy web applications[C]//Proceedings of the 18th ACM Conference on Computer and Communications Security.New York,NY,USA:ACM,2011:601-614.
  • 6Vogt P,Nentwich F,Jovanovic N,et al.Cross site scripting prevention with dynamic data tainting and static analysis[C]//Proceedings of the 14th Annual Network and Distributed System Security Symposium.San Diego,CA,USA:Internet Society,2007.
  • 7Minded Security.DOMinatorPro:Securing next generation of Web applications[EB/OL].(2012-09-30).[2015-04-07].https://dominator.mindedsecurity.com.
  • 8Lekies S,Stock B,Johns M.25 million flows later:Large-scale detection of DOM-based XSS[C]//Proceedings of the 20th ACM Conference on Computer and Communications Security.New York,NY,USA:ACM,2013:1193-1204.
  • 9Saxena P,Hanna S,Poosankam P,et al.FLAX:Systematic discovery of client-side validation vulnerabilities in rich Web applications[C]//Proceedings of the 17th Annual Network and Distributed System Security Symposium.San Diego,CA,USA:Internet Society,2010.
  • 10Phung P H,Sands D,Chudnov A.Lightweight selfprotecting JavaScript[C]//Proceedings of the 4th International Symposium on Information,Computer,and Communications Security.New York,NY,USA:ACM,2009:47-60.

共引文献32

同被引文献5

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部