COMPUTER NETWORK VIRUS DEFENSE WITH DATA MINING-BASED ACTIVE PROTECTION

被引:1
作者
Li, Xiaohong [1 ]
Li, Yang [1 ]
He, Hong [2 ]
机构
[1] Shijiazhuang Informat Engn Vocat Coll, Dept Network & Commun Engn, Shijiazhuang 050000, Hebei, Peoples R China
[2] Shijiazhuang Informat Engn Vocat Coll, Dept Software Engn, Shijiazhuang 050000, Hebei, Peoples R China
来源
SCALABLE COMPUTING-PRACTICE AND EXPERIENCE | 2024年 / 25卷 / 01期
关键词
Metamorphic virus; PE documents; Win API sequence; Data mining; OOA mining;
D O I
10.12694/scpe.v25i1.2173
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
A novel approach is presented in this paper to address the limitations of virtual machine technology, active kernel technology, heuristic killing technology, and behaviour killing technology in computer network virus defence. The proposed method provides data mining technology, specifically Object-Oriented Analysis (OOA) mining, to detect deformed and unknown viruses by analyzing the sequence of Win API calls in PE files. Experimental results showcase the Data Mining-based Antivirus (DMAV) system's superiority over existing virus scanning software in multiple aspects: higher accuracy in deformed virus detection, enhanced active defence capabilities against unknown viruses (with a recognition rate of 92%), improved efficiency, and a reduced false alarm rate for non-virus file detection. Furthermore, the paper introduces an OOA rule generator to optimize feature extraction, enhancing the system's intelligence and robustness. This research provides a promising solution to support virus detection accuracy, active defence mechanisms, and overall efficiency while minimizing false positives in virus scanning, thus contributing significantly to the advancement of computer network security.
引用
收藏
页码:45 / 54
页数:10
相关论文
共 23 条
  • [1] Deep Learning Based Hybrid Intrusion Detection Systems to Protect Satellite Networks
    Azar, Ahmad Taher
    Shehab, Esraa
    Mattar, Ahmed M.
    Hameed, Ibrahim A.
    Elsaid, Shaimaa Ahmed
    [J]. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2023, 31 (04)
  • [2] Learning metamorphic malware signatures from samples
    Campion, Marco
    Dalla Preda, Mila
    Giacobazzi, Roberto
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2021, 17 (03) : 167 - 183
  • [3] Machine learning in cybersecurity: a comprehensive survey
    Dasgupta, Dipankar
    Akhtar, Zahid
    Sen, Sajib
    [J]. JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2022, 19 (01): : 57 - 106
  • [4] Distributed denial of service attack prediction: Challenges, open issues and opportunities
    de Neira, Anderson Bergamini
    Kantarci, Burak
    Nogueira, Michele
    [J]. COMPUTER NETWORKS, 2023, 222
  • [5] Functionality-Preserving Black-Box Optimization of Adversarial Windows Malware
    Demetrio, Luca
    Biggio, Battista
    Lagorio, Giovanni
    Roli, Fabio
    Armando, Alessandro
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 3469 - 3478
  • [6] doyeon kim, 2021, [Journal of The Korea Institute of Information Security and Cryptology, 정보보호학회논문지], V31, P559, DOI 10.13089/JKIISC.2021.31.4.559
  • [7] Gharacheh M, 2015, 2015 4TH IRANIAN JOINT CONGRESS ON FUZZY AND INTELLIGENT SYSTEMS (CFIS)
  • [8] Intrusion Detection in Internet of Things Systems: A Review on Design Approaches Leveraging Multi-Access Edge Computing, Machine Learning, and Datasets
    Gyamfi, Eric
    Jurcut, Anca
    [J]. SENSORS, 2022, 22 (10)
  • [9] A Method for Windows Malware Detection Based on Deep Learning
    Huang, Xiang
    Ma, Li
    Yang, Wenyin
    Zhong, Yong
    [J]. JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2021, 93 (2-3): : 265 - 273
  • [10] JHA A. K., 2022, SN Computer Science, V4, P10