首页 | 本学科首页   官方微博 | 高级检索  
     

基于属性相似度的恶意代码检测方法
引用本文:张福勇,秦勇.基于属性相似度的恶意代码检测方法[J].沈阳工业大学学报,2017,39(6):659-663.
作者姓名:张福勇  秦勇
作者单位:东莞理工学院 计算机与网络安全学院, 广东 东莞 523808
基金项目:国家自然科学基金资助项目(61402106);广东省普通高校国际暨港澳台合作创新平台及国际合作重大项目(2015KGJHZ027);广东省教育科学规划资助项目(14JXN029)
摘    要:针对未知恶意代码数量急剧增长,现有的检测方法不能有效检测的问题,提出一种基于属性相似度的恶意代码检测方法.该方法将样本文件转换成十六进制格式,提取样本文件的所有n-gram,计算每个n-gram的信息增益,并选择具有最大信息增益的N个n-gram作为特征属性,分别计算恶意代码和正常文件每一维属性的平均值,通过比较待测样本属性与恶意代码和正常文件两类别属性均值的相似度来判断待测样本类别.结果表明,该方法对未知恶意代码的检测性能优于基于n-gram的恶意代码检测方法.

关 键 词:恶意代码检测  属性相似度  网络与信息安全  入侵检测  数据挖掘  机器学习  未知恶意代码  静态分析  

Malware detection method based on attribute similarity
ZHANG Fu-yong,QIN Yong.Malware detection method based on attribute similarity[J].Journal of Shenyang University of Technology,2017,39(6):659-663.
Authors:ZHANG Fu-yong  QIN Yong
Affiliation:School of Computer Science and Network Security, Dongguan University of Technology, Dongguan 523808, China
Abstract:Aiming at the problem that the number of unknown malware has dramatically increased and the existing detection methods can not effectively detect them, a malware detection method based on attribute similarity was proposed. In the proposed method, the sample files were converted into the hexadecimal format, and all n-grams of sample files were extracted. The information gain of each n-gram was calculated, and N n-grams with the maximum information gains were selected as the feature attributes. In addition, the average value of each dimension attribute in malware and normal files was calculated, respectively. The categories of samples to be detected were determined through comparing the attribute similarity of samples to be detected as well as the similarity of avarage attribute values of both malware and normal files. The results reveal that the proposed method is superior to the malware detection method based on n-grams for unknown malware detection.
Keywords:malware detection  attribute similarity  network and information security  intrusion detection  data mining  machine learning  unknown malware  static analysis  
本文献已被 CNKI 等数据库收录!
点击此处可从《沈阳工业大学学报》浏览原始摘要信息
点击此处可从《沈阳工业大学学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号