期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
An Information Hiding Algorithm Based on Bitmap Resource of Portable Executable File 被引量:2
1
作者 Jie Xu Li-Jun Feng +1 位作者 Ya-Lan Ye Yue Wu 《Journal of Electronic Science and Technology》 CAS 2012年第2期181-184,共4页
An information hiding algorithm is proposed,which hides information by embedding secret data into the palette of bitmap resources of portable executable(PE)files.This algorithm has higher security than some traditiona... An information hiding algorithm is proposed,which hides information by embedding secret data into the palette of bitmap resources of portable executable(PE)files.This algorithm has higher security than some traditional ones because of integrating secret data and bitmap resources together.Through analyzing the principle of bitmap resources parsing in an operating system and the layer of resource data in PE files,a safe and useful solution is presented to solve two problems that bitmap resources are incorrectly analyzed and other resources data are confused in the process of data embedding.The feasibility and effectiveness of the proposed algorithm are confirmed through computer experiments. 展开更多
关键词 Bitmap resources data embedding information hiding portable executable file.
在线阅读 下载PDF
Impact of Portable Executable Header Features on Malware Detection Accuracy
2
作者 Hasan H.Al-Khshali Muhammad Ilyas 《Computers, Materials & Continua》 SCIE EI 2023年第1期153-178,共26页
One aspect of cybersecurity,incorporates the study of Portable Executables(PE)files maleficence.Artificial Intelligence(AI)can be employed in such studies,since AI has the ability to discriminate benign from malicious... One aspect of cybersecurity,incorporates the study of Portable Executables(PE)files maleficence.Artificial Intelligence(AI)can be employed in such studies,since AI has the ability to discriminate benign from malicious files.In this study,an exclusive set of 29 features was collected from trusted implementations,this set was used as a baseline to analyze the presented work in this research.A Decision Tree(DT)and Neural Network Multi-Layer Perceptron(NN-MLPC)algorithms were utilized during this work.Both algorithms were chosen after testing a few diverse procedures.This work implements a method of subgrouping features to answer questions such as,which feature has a positive impact on accuracy when added?Is it possible to determine a reliable feature set to distinguish a malicious PE file from a benign one?when combining features,would it have any effect on malware detection accuracy in a PE file?Results obtained using the proposed method were improved and carried few observations.Generally,the obtained results had practical and numerical parts,for the practical part,the number of features and which features included are the main factors impacting the calculated accuracy,also,the combination of features is as crucial in these calculations.Numerical results included,finding accuracies with enhanced values,for example,NN_MLPC attained 0.979 and 0.98;for DT an accuracy of 0.9825 and 0.986 was attained. 展开更多
关键词 AI driven cybersecurity artificial intelligence CYBERSECURITY Decision Tree Neural Network Multi-Layer Perceptron Classifier portable executable(PE)file header features
在线阅读 下载PDF
Robust Malicious Executable Detection Using Host-Based Machine Learning Classifier
3
作者 Khaled Soliman Mohamed Sobh Ayman M.Bahaa-Eldin 《Computers, Materials & Continua》 SCIE EI 2024年第4期1419-1439,共21页
The continuous development of cyberattacks is threatening digital transformation endeavors worldwide and leadsto wide losses for various organizations. These dangers have proven that signature-based approaches are ins... The continuous development of cyberattacks is threatening digital transformation endeavors worldwide and leadsto wide losses for various organizations. These dangers have proven that signature-based approaches are insufficientto prevent emerging and polymorphic attacks. Therefore, this paper is proposing a Robust Malicious ExecutableDetection (RMED) using Host-based Machine Learning Classifier to discover malicious Portable Executable (PE)files in hosts using Windows operating systems through collecting PE headers and applying machine learningmechanisms to detect unknown infected files. The authors have collected a novel reliable dataset containing 116,031benign files and 179,071 malware samples from diverse sources to ensure the efficiency of RMED approach.The most effective PE headers that can highly differentiate between benign and malware files were selected totrain the model on 15 PE features to speed up the classification process and achieve real-time detection formalicious executables. The evaluation results showed that RMED succeeded in shrinking the classification timeto 91 milliseconds for each file while reaching an accuracy of 98.42% with a false positive rate equal to 1.58. Inconclusion, this paper contributes to the field of cybersecurity by presenting a comprehensive framework thatleverages Artificial Intelligence (AI) methods to proactively detect and prevent cyber-attacks. 展开更多
关键词 portable executable MALWARE intrusion detection CYBERSECURITY zero-day threats Host IntrusionDetection System(HIDS) machine learning Anomaly-based Intrusion Detection System(AIDS) deep learning
在线阅读 下载PDF
Semantic Malware Classification Using Artificial Intelligence Techniques
4
作者 Eliel Martins Javier Bermejo Higuera +3 位作者 Ricardo Sant’Ana Juan Ramón Bermejo Higuera Juan Antonio Sicilia Montalvo Diego Piedrahita Castillo 《Computer Modeling in Engineering & Sciences》 2025年第3期3031-3067,共37页
The growing threat of malware,particularly in the Portable Executable(PE)format,demands more effective methods for detection and classification.Machine learning-based approaches exhibit their potential but often negle... The growing threat of malware,particularly in the Portable Executable(PE)format,demands more effective methods for detection and classification.Machine learning-based approaches exhibit their potential but often neglect semantic segmentation of malware files that can improve classification performance.This research applies deep learning to malware detection,using Convolutional Neural Network(CNN)architectures adapted to work with semantically extracted data to classify malware into malware families.Starting from the Malconv model,this study introduces modifications to adapt it to multi-classification tasks and improve its performance.It proposes a new innovative method that focuses on byte extraction from Portable Executable(PE)malware files based on their semantic location,resulting in higher accuracy in malware classification than traditional methods using full-byte sequences.This novel approach evaluates the importance of each semantic segment to improve classification accuracy.The results revealed that the header segment of PE files provides the most valuable information for malware identification,outperforming the other sections,and achieving an average classification accuracy of 99.54%.The above reaffirms the effectiveness of the semantic segmentation approach and highlights the critical role header data plays in improving malware detection and classification accuracy. 展开更多
关键词 MALWARE portable executable SEMANTIC convolutional neural networks
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部