期刊文献+

基于有效窗口和朴素贝叶斯的恶意代码分类 被引量:14

Malware Classification Approach Based on Valid Window and Naive Bayes
在线阅读 下载PDF
导出
摘要 恶意代码分类是恶意代码分析和入侵检测领域中的核心问题.现有分类方法分析效率低,准确性差,主要原因在于行为分析原始资料规模大,噪声高,随机因素干扰.针对上述问题,以恶意代码行为序列报告作为基础,在分析随机因素及行为噪声对恶意代码行为特征和操作相似性的干扰之后,给出一个系统调用参数有效窗口模型,通过该模型加强行为序列的相似度描述能力,降低随机因素的干扰.在此基础上提出一种基于朴素贝叶斯机器学习模型和操作相似度窗口的恶意代码自动分类方法.设计并实现了一个自动恶意代码行为分类器原型MalwareFilter.使用真实恶意代码生成的行为序列报告对原型系统进行评估,通过实验证明了该方法的有效性,结果表明,该方法通过操作相似度窗口提高了训练和分类过程的性能和准确度. Malware classification is the key problem in the field of malicious code analysis and intrusion detection. Existing malware classification approaches have low efficiency and poor accuracy because the raw behavior analysis data is large-scale with high noise data and interfered by random factors. To solve the above issues, taking the malware behavior reports as raw data, this paper analyzes the malware behavior characteristics, the operation similarity, the interference situation of random factors and noisy behavior data. Then it proposes a parameter valid window model for system call which improves the ability of operation sequence to describe behavior similarity. On this basis, the paper presents a malware classification approach based on naive Bayes machine learning model and parameter valid window. Moreover, an automatic malware behavior classifier prototype called MalwareFilter is designed and implemented in this paper. In case study, we evaluate the prototype using system call sequence reports generated through true malware. The experiment results show that our approach is effective, and the performance and accuracy of training and classification are improved through parameter valid window.
出处 《计算机研究与发展》 EI CSCD 北大核心 2014年第2期373-381,共9页 Journal of Computer Research and Development
基金 中央高校基本科研业务费专项基金项目(YWF-11-03-Q-037)
关键词 恶意代码 行为分类 朴素贝叶斯 机器学习 入侵检测 行为特征 操作相似度 malware behavior classification naive Bayes machine learning intrusion detectionbehavior characteristic operation similarity
  • 相关文献

参考文献28

  • 1Symantec Corporation. Symantec Internet security threat report trends for 2010[EB/OL].http://msisac.cisecurity.org/resources/reports/documents/SymantecInternetSecurityThreatReport2010.pdf,2012.
  • 2Linn C,Debray S. Obfuscation of executable code to improve resistance to static disassembly[A].New York:ACM,2003.
  • 3Christodorescu M,Jha S. Static analysis of executables to detect malicious patterns[A].Berkeley,CA:USENIX Association,2003.
  • 4Kruegel C,Kirda E,Mutz D. Automating mimicry attacks using static binary analysis[A].Berkeley,CA:USENIX Association,2005.
  • 5Preda M D,Christodorescu M,Jha S. A semantics based approach to malware detection[A].New York:ACM,2007.377-388.
  • 6Moser A,Kruegel C,Kirda E. Limits of static analysis for malware detection[A].Piscataway,NJ:IEEE,2007.421-430.
  • 7Szor P. The Art of Computer Virus Research and Defense[M].Boston:Addison-Wesley Professional,2005.59-98.
  • 8Popov I V,Debray S K,Andrews G R. Binary obfuscation using signals[A].Berkeley,CA:USENIX Association,2007.275-290.
  • 9Baecher P,Koetter M,Holz T. The Nepenthes platform:An efficient approach to collect malware[A].{H}Berlin:Springer-Verlag,2006.165-184.
  • 10Leita C,Dacier M,Massicotte F. Automatic handling of protocol dependencies and reaction to 0-day attacks with ScriptGen based honeypots[A].{H}Berlin:Springer-Verlag,2006.185-205.

二级参考文献8

  • 1[1]D Tumer,S Entwisle,M Fossi,et al.Symantec Internet security thread report trends for January06-june06.Symantec Corporation,Cupertino,CA,USA,Tech Rep:Volume X,2006
  • 2[2]L A Goldberg,P W Goldberg,C A Phillips,et al.Constructing computer virus phylogenies.Journal of Algorithms,1998,26(1):188-208
  • 3[3]G Erdelyi,E Carrera.Digital genome mapping:Advanced binary malware analysis.The 15th Virus Bulletin Int'lConf,Chicago,IL,2004
  • 4[4]M G Schultz,E Eskin,E Zadok,et al.Data mining methods for detection of new malicious executables.In:Proc of the 2001 IEEE Symp on Security and Privacy.Los Alamitos,CA:IEEE Computer Society Press,2001.38-49
  • 5[5]S Wehner.Analyzing worms using compression.http://homepages.cwi.nl/~wehner/worms,2006
  • 6[6]T Lee,J J Mody.Behavioral classification.The 15th EICAR Conf,Hamburg,Germany,2006
  • 7[7]V Levenshtein.Binary codes capable of correcting deletions.Insertions and Reversals.SovietPhysics Docklady,1966,10(8):707-710
  • 8[8]S B Needleman,C D Wunsch.A general method applicable to the search for similarities in the amino acid sequence of two proteins.Journal of Molecular Biology,1970,48(3):443-453

共引文献3

同被引文献230

引证文献14

二级引证文献154

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部