期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Droid Detector:Android Malware Characterization and Detection Using Deep Learning 被引量:37
1
作者 Zhenlong Yuan Yongqiang Lu Yibo Xue 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2016年第1期114-123,共10页
Smartphones and mobile tablets are rapidly becoming indispensable in daily life. Android has been the most popular mobile operating system since 2012. However, owing to the open nature of Android, countless malwares a... Smartphones and mobile tablets are rapidly becoming indispensable in daily life. Android has been the most popular mobile operating system since 2012. However, owing to the open nature of Android, countless malwares are hidden in a large number of benign apps in Android markets that seriously threaten Android security. Deep learning is a new area of machine learning research that has gained increasing attention in artificial intelligence. In this study, we propose to associate the features from the static analysis with features from dynamic analysis of Android apps and characterize malware using deep learning techniques. We implement an online deep-learning-based Android malware detection engine(Droid Detector) that can automatically detect whether an app is a malware or not. With thousands of Android apps, we thoroughly test Droid Detector and perform an indepth analysis on the features that deep learning essentially exploits to characterize malware. The results show that deep learning is suitable for characterizing Android malware and especially effective with the availability of more training data. Droid Detector can achieve 96.76% detection accuracy, which outperforms traditional machine learning techniques. An evaluation of ten popular anti-virus softwares demonstrates the urgency of advancing our capabilities in Android malware detection. 展开更多
关键词 Android security malware detection characterization deep learning association rules mining
原文传递
An Improved String-Searching Algorithm and Its Application in Component Security Testing 被引量:1
2
作者 Jinfu Chen Saihua Cai +4 位作者 Lili Zhu Yuchi Guo Rubing Huang Xiaolei Zhao Yunqi Sheng 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2016年第3期281-294,共14页
Mass monitor logs are produced during the process of component security testing. In order to mine the explicit and implicit security exception information of the tested component, the log should be searched for keywor... Mass monitor logs are produced during the process of component security testing. In order to mine the explicit and implicit security exception information of the tested component, the log should be searched for keyword strings. However, existing string-searching algorithms are not very efficient or appropriate for the operation of searching monitor logs during component security testing. For mining abnormal information effectively in monitor logs, an improved string-searching algorithm is proposed. The main idea of this algorithm is to search for the first occurrence of a character in the main string. The character should be different and farther from the last character in the pattern string. With this algorithm, the backward moving distance of the pattern string will be increased and the matching time will be optimized. In the end, we conduct an experimental study based on our approach, the results of which show that the proposed algorithm finds strings in monitor logs 11.5% more efficiently than existing approaches. 展开更多
关键词 component testing security vulnerabilities detection monitor log abnormal information string-searching
原文传递
Genetic Algorithm with Variable Length Chromosomes for Network Intrusion Detection 被引量:5
3
作者 Sunil Nilkanth Pawar Rajankumar Sadashivrao Bichkar 《International Journal of Automation and computing》 EI CSCD 2015年第3期337-342,共6页
Genetic algorithm(GA) has received significant attention for the design and implementation of intrusion detection systems. In this paper, it is proposed to use variable length chromosomes(VLCs) in a GA-based network i... Genetic algorithm(GA) has received significant attention for the design and implementation of intrusion detection systems. In this paper, it is proposed to use variable length chromosomes(VLCs) in a GA-based network intrusion detection system.Fewer chromosomes with relevant features are used for rule generation. An effective fitness function is used to define the fitness of each rule. Each chromosome will have one or more rules in it. As each chromosome is a complete solution to the problem, fewer chromosomes are sufficient for effective intrusion detection. This reduces the computational time. The proposed approach is tested using Defense Advanced Research Project Agency(DARPA) 1998 data. The experimental results show that the proposed approach is efficient in network intrusion detection. 展开更多
关键词 Genetic algorithms intrusion detection variable length chromosome network security evolutionary optimization.
原文传递
Blockchain abnormal behavior awareness methods: a survey
4
作者 Chuyi Yan Chen Zhang +3 位作者 Zhigang Lu Zehui Wang Yuling Liu Baoxu Liu 《Cybersecurity》 EI CSCD 2022年第2期92-118,共27页
With the wide application and development of blockchain technology in various fields such as finance, government affairs and medical care, security incidents occur frequently on it, which brings great threats to users... With the wide application and development of blockchain technology in various fields such as finance, government affairs and medical care, security incidents occur frequently on it, which brings great threats to users’ assets and information. Many researchers have worked on blockchain abnormal behavior awareness in respond to these threats. We summarize respectively the existing public blockchain and consortium blockchain abnormal behavior awareness methods and ideas in detail as the difference between the two types of blockchain. At the same time, we summarize and analyze the existing data sets related to mainstream blockchain security, and finally discuss possible future research directions. Therefore, this work can provide a reference for blockchain security awareness research. 展开更多
关键词 Blockchain Abnormal behavior AWARENESS SUPERVISION security detection
原文传递
A Vulnerability Model Construction Method Based on Chemical Abstract Machine
5
作者 LI Xiang CHEN Jinfu +4 位作者 LIN Zhechao ZHANG Lin WANG Zibin ZHOU Minmin XIE Wanggen 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2018年第2期150-162,共13页
It is difficult to formalize the causes of vulnerability, and there is no effective model to reveal the causes and characteristics of vulnerability. In this paper, a vulnerability model construction method is proposed... It is difficult to formalize the causes of vulnerability, and there is no effective model to reveal the causes and characteristics of vulnerability. In this paper, a vulnerability model construction method is proposed to realize the description of vulnerability attribute and the construction of a vulnerability model. A vulnerability model based on chemical abstract machine(CHAM) is constructed to realize the CHAM description of vulnerability model, and the framework of vulnerability model is also discussed. Case study is carried out to verify the feasibility and effectiveness of the proposed model. In addition, a prototype system is also designed and implemented based on the proposed vulnerability model. Experimental results show that the proposed model is more effective than other methods in the detection of software vulnerabilities. 展开更多
关键词 software security vulnerability detection vulner-ability analysis vulnerability model chemical abstract machine
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部