Ransomware Detection Based on V-detector Negative Selection Algorithm

被引:0
作者
Lu, Tianliang [1 ]
Zhang, Lu [1 ]
Wang, Shunye [1 ]
Gong, Qi [1 ]
机构
[1] Peoples Publ Secur Univ China, Inst Informat Technol & Network Secur, Beijing, Peoples R China
来源
2017 INTERNATIONAL CONFERENCE ON SECURITY, PATTERN ANALYSIS, AND CYBERNETICS (SPAC) | 2017年
关键词
ransomware; detection; artificial immune system; V-detector; negative selection algorithm;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As a new type of malicious software, ransomw are is one of the biggest security threats in recent years. Inspired by biological immune system, a ransomware detection method based on V-detector negative selection algorithm with mutation optimization is proposed, which is referred to op-RDVD. The behavioral features of ransomware are extracted through dynamic analysis, such as hard disk reading and writing, the document encryption and deletion, etc. Some of benign samples are used to build the self space. The variable-sized detectors are generated both randomly and extracted from ransomware. To improve the ransomware detection accuracy and efficiency, optimize the space distribution of detectors through clone and mutation, achieving maximized coverage of non-self space and minimized overlapping among detectors. The experimental results show that our algorithm has better detection ability than that of the previous method.
引用
收藏
页码:531 / 536
页数:6
相关论文
共 17 条
  • [1] [Anonymous], P IEEE 71 VEH TECH C
  • [2] Detection of Mobile Malware: An Artificial Immunity Approach
    Brown, James
    Anwar, Mohd
    Dozier, Gerry
    [J]. 2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2016), 2016, : 74 - 80
  • [3] Druva, 2017, 2017 ANN RANS REP
  • [4] Forrest S., 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.94CH3444-7), P202, DOI 10.1109/RISP.1994.296580
  • [5] Garima R, 2015, INT J COMPUTER SCI M, V4, P170
  • [6] Anomaly Detection Using Real-Valued Negative Selection
    Fabio A. González
    Dipankar Dasgupta
    [J]. Genetic Programming and Evolvable Machines, 2003, 4 (4) : 383 - 403
  • [7] Hajmasan G, 2017, 2017 5TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS)
  • [8] Hybrid email spam detection model with negative selection algorithm and differential evolution
    Idris, Ismaila
    Selamat, Ali
    Omatu, Sigeru
    [J]. ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2014, 28 : 97 - 110
  • [9] Ji Z, 2004, LECT NOTES COMPUT SC, V3102, P287
  • [10] Ji Z, 2005, GECCO 2005: GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE, VOLS 1 AND 2, P281