Dynamic analysis of malicious behavior propagation based on feature selection in software network

被引:0
|
作者
Xue, Huajian [1 ,2 ]
Wang, Yali [3 ]
Tang, Qiguang [4 ]
机构
[1] Tongling Univ, Coll Math & Comp Sci, Tongling, Peoples R China
[2] Tongling Univ, Anhui Engn Res Ctr Intelligent Mfg Copper based Ma, Tongling, Peoples R China
[3] Suzhou City Univ, Coll Comp Sci & Artificial Intelligence, Suzhou, Peoples R China
[4] Zhongyuan Oilfield Co SINOPEC, Zhongyuan Oilfield Oil & Gas Engn Serv Ctr, Puyang, Peoples R China
来源
FRONTIERS IN PHYSICS | 2024年 / 12卷
关键词
recurrent neural networks; information propagation; feature selection; dynamic analysis; software network;
D O I
10.3389/fphy.2024.1493209
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
In the era of big data, the propagation of malicious software poses a significant threat to corporate data security. To safeguard data assets from the encroachment of malware, it is essential to conduct a dynamic analysis of various information propagation behaviors within software. This paper introduces a dynamic analysis detection method for malicious behavior based on feature extraction (MBDFE), designed to effectively identify and thwart the spread of malicious software. The method is divided into three stages: First, variable-length N-gram algorithms are utilized to extract subsequences of varying lengths from the sample APl call sequences as continuous dynamic features. Second, feature selection techniques based on information gain are employed to identify suitable classification features. Lastly, recurrent neural networks (RNN) are applied for the classification training and prediction of diverse software behaviors. Experimental results and analysis demonstrate that this approach can accurately detect and promptly interrupt the information dissemination of malicious software when such behavior occurs, thereby enhancing the precision and timeliness of malware detection.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] Software Malicious Behavior Analysis Model based on System Call and Function Interface
    Fan, Yongkai
    Lei, Jing
    Peng, Cong
    Wang, Jinghan
    Liu, Jiaxu
    Zhao, Guanqun
    Bai, Jianrong
    2019 9TH IEEE ANNUAL INTERNATIONAL CONFERENCE ON CYBER TECHNOLOGY IN AUTOMATION, CONTROL, AND INTELLIGENT SYSTEMS (IEEE-CYBER 2019), 2019, : 59 - 64
  • [2] Feature Selection for Human Resource Selection Based on Affinity Propagation and SVM Sensitivity Analysis
    Wang, Qiangwei
    Li, Boyang
    Hu, Jinglu
    2009 WORLD CONGRESS ON NATURE & BIOLOGICALLY INSPIRED COMPUTING (NABIC 2009), 2009, : 31 - 36
  • [3] FAFS: A Fuzzy Association Feature Selection Method for Network Malicious Traffic Detection
    Feng, Yongxin
    Kang, Yingyun
    Zhang, Hao
    Zhang, Wenbo
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (01): : 240 - 259
  • [4] Intrusion Detection Based on Back-Propagation Neural Network and Feature Selection Mechanism
    Sun, Ning-Qing
    Li, Yang
    FUTURE GENERATION INFORMATION TECHNOLOGY, PROCEEDINGS, 2009, 5899 : 151 - 159
  • [5] Two-layer malicious network flow detection system with sparse linear model based feature selection
    Catak, Ferhat Ozgur
    JOURNAL OF THE NATIONAL SCIENCE FOUNDATION OF SRI LANKA, 2018, 46 (04): : 601 - 612
  • [6] Performance analysis and feature selection for network-based intrusion detection with deep learning
    Caner, Serhat
    Erdogmus, Nesli
    Erten, Y. Murat
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2022, 30 (03) : 629 - 643
  • [7] BP Neural Network Feature Selection Method Based on Sensitivity Analysis
    Dun, Yuqing
    Chen, Li
    Liu, Jing
    Chen, Qiang
    ADVANCING KNOWLEDGE DISCOVERY AND DATA MINING TECHNOLOGIES, PROCEEDINGS, 2009, : 451 - 455
  • [8] An Identification Method for Critical Nodes of Fault Propagation Based on Software Dynamic Execution Network
    Tang, Chao
    Lu, Minyan
    Kong, Shiyi
    PROCEEDINGS OF 2019 IEEE 10TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2019), 2019, : 249 - 255
  • [9] Software defect prediction using wrapper-based dynamic arithmetic optimization for feature selection
    Anand, Kunal
    Jena, Ajay Kumar
    Das, Himansu
    Askar, S. S.
    Abouhawwash, Mohamed
    CONNECTION SCIENCE, 2025, 37 (01)
  • [10] BAGUETTE: Hunting for Evidence of Malicious Behavior in Dynamic Analysis Reports
    Raulin, Vincent
    Gimenez, Pierre-Francois
    Han, Yufei
    Tong, Valerie Viet Triem
    PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 417 - 424