期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Sensitive system calls based packed malware variants detection using principal component initialized MultiLayers neural networks 被引量:4
1
作者 Jixin Zhang Kehuan Zhang +2 位作者 Zheng Qin Hui Yin Qixin Wu 《Cybersecurity》 2018年第1期185-197,共13页
Malware detection has become mission sensitive as its threats spread from computer systems to Internet of things systems.Modern malware variants are generally equipped with sophisticated packers,which allow them bypas... Malware detection has become mission sensitive as its threats spread from computer systems to Internet of things systems.Modern malware variants are generally equipped with sophisticated packers,which allow them bypass modern machine learning based detection systems.To detect packed malware variants,unpacking techniques and dynamic malware analysis are the two choices.However,unpacking techniques cannot always be useful since there exist some packers such as private packers which are hard to unpack.Although dynamic malware analysis can obtain the running behaviours of executables,the unpacking behaviours of packers add noisy information to the real behaviours of executables,which has a bad affect on accuracy.To overcome these challenges,in this paper,we propose a new method which first extracts a series of system calls which is sensitive to malicious behaviours,then use principal component analysis to extract features of these sensitive system calls,and finally adopt multi-layers neural networks to classify the features of malware variants and legitimate ones.Theoretical analysis and real-life experimental results show that our packed malware variants detection technique is comparable with the the state-of-art methods in terms of accuracy.Our approach can achieve more than 95.6\%of detection accuracy and 0.048 s of classification time cost. 展开更多
关键词 malware variants Multi-layers neural networks Principal component analysis Sensitive system calls Sophisticated packers
原文传递
Malware variants detection based on ensemble learning
2
作者 Ma Yan Du Donggao 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2020年第2期82-90,共9页
Application programming interface(API)is a procedure call interface to operation system resource.API-based behavior features can capture the malicious behaviors of malware variants.However,existing malware detection a... Application programming interface(API)is a procedure call interface to operation system resource.API-based behavior features can capture the malicious behaviors of malware variants.However,existing malware detection approaches have a deal of complex operations on constructing and matching.Furthermore,graph matching is adopted in many approaches,which is a nondeterministic polynominal(NP)-complete problem because of computational complexity.To address these problems,a novel approach is proposed to detect malware variants.Firstly,the API of the malware are divided by their functions and parameters.Then,the classified behavior graph(CBG)is constructed from the API call sequences.Finally,the signature based on CBGs for each malware family is generated.Besides,the malware variants are classified by ensemble learning algorithm.Experiments on 1220 malware samples show that the true positive rate(TPR)is up to 89.0%with the low false positive rate(FPR)3.7%by ensemble learning. 展开更多
关键词 classified behavior malware variant ensemble learning
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部