A Malicious Mining Code Detection Method Based on Multi-Features Fusion

被引:16
作者
Li, Shudong [1 ]
Jiang, Laiyuan [1 ]
Zhang, Qianqing [1 ]
Wang, Zhen [2 ,3 ]
Tian, Zhihong [1 ]
Guizani, Mohsen [4 ]
机构
[1] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou 510006, Peoples R China
[2] Northwestern Polytech Univ, Sch Mech Engn, Xian 710072, Peoples R China
[3] Northwestern Polytech Univ, Ctr Opt Imagery Anal & Learning OPTIMAL, Xian 710072, Peoples R China
[4] Mohamed Bin Zayed Univ Artificial Intelligence MBZ, Machine Learning Dept, Abu Dhabi, U Arab Emirates
来源
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING | 2023年 / 10卷 / 05期
关键词
Feature extraction; Codes; Malware; Analytical models; Training; Terminology; Production; Feature fusion; malicious mining code; static analysis; statistics feature;
D O I
10.1109/TNSE.2022.3155187
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the continuous increase in the economic value of new digital currencies represented by Bitcoin, more and more cybercriminals use malicious code to occupy victims' system resources and network resources for mining without the victims' permission, thereby obtaining cryptocurrency. This type of malicious code named malicious mining code has brought considerable influence and harm to society, enterprises and users. The mining code always conceals the fact that it consumes computer resources in a way that is difficult for ordinary people to discover. This paper proposes a malicious mining code detection method based on feature fusion and machine learning. First, we analyze from static analysis methods and statistical analysis methods to extract multi-dimensional features. Then for multi-dimensional text features, feature vectors are extracted through the n-gram model and TF-IDF, and best feature vectors are selected through the classifier and we fuse these best feature vectors with other statistic features to train our detection model. Finally, automatic detection is performed based on the machine learning framework. The experimental results show that the recognition accuracy of our method can reach 98.0%, its F1 score reach 0.969, and the ROC's AUC reach 0.973.
引用
收藏
页码:2731 / 2739
页数:9
相关论文
共 36 条
[1]  
360 Internet Security Center, NRSMiner: A sophisticated mining botnet
[2]   Security in Internet of Things: issues, challenges, taxonomy, and architecture [J].
Adat, Vipindev ;
Gupta, B. B. .
TELECOMMUNICATION SYSTEMS, 2018, 67 (03) :423-441
[3]   Energy Efficient Resource Allocation in D2D-Assisted Heterogeneous Networks with Relays [J].
Ali, Mudassar ;
Qaisar, Saad ;
Naeem, Muhammad ;
Mumtaz, Shahid .
IEEE ACCESS, 2016, 4 :4902-4911
[4]   Hidden Markov models for malware classification [J].
Annachhatre, Chinmayee ;
Austin, Thomas H. ;
Stamp, Mark .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2015, 11 (02) :59-73
[5]  
[Anonymous], 2012, Secur. Inform, DOI DOI 10.1186/2190-8532-1-1
[6]   Survey on the Internet of Vehicles: Network Architectures and Applications [J].
Ji B. ;
Zhang X. ;
Mumtaz S. ;
Han C. ;
Li C. ;
Wen H. ;
Wang D. .
IEEE Communications Standards Magazine, 2020, 4 (01) :34-41
[7]   Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment [J].
Bhushan, Kriti ;
Gupta, B. B. .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (05) :1985-1997
[8]  
Devesa J, 2010, ICEIS 2010: PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS, VOL 2: ARTIFICIAL INTELLIGENCE AND DECISION SUPPORT SYSTEMS, P395
[9]  
Du X., 2004, Ad Hoc Networks, V2, P241
[10]  
Duan YH, 2015, IEEE ICC, P5691, DOI 10.1109/ICC.2015.7249229