Simulation on static detection of malicious code based on behavior information gain

被引:1
作者
Wei, Pengcheng [1 ]
Shi, Chengxiang [1 ]
He, Fangcheng [2 ]
机构
[1] Chongqing Univ Educ, Sch Math & Informat Engn, Chongqing, Peoples R China
[2] Chongqing Univ Educ, Sch Foreign Languages & Literatures, Chongqing, Peoples R China
关键词
Behavior information gain; malicious code; static detection; feature selection method; dispersion degree; INTERNET;
D O I
10.3233/JIFS-179838
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
When the malicious code is detected by the current method, the features of the malicious code cannot be classified in detail. A static detection method of malicious code based on behavior information gain is proposed. The method uses the feature selection method of behavior information gain to get the average mutual information between different code types, and gives different types of feature libraries. On this basis, the character sets are fused and the sample characteristics of the malicious code are extracted. The dispersion degree of the sequence distribution of malicious code samples is measured, the distance vector of the plurality of eigenvectors is obtained, and the weighted matching of the features is performed. The malicious code is detected statically based on the matching result. The results demonstrated that the proposed method tends to be more accurate and provides a scientific basis for ensuring the security and stability of the Android operating system.
引用
收藏
页码:7683 / 7692
页数:10
相关论文
共 50 条
[21]   Detection of malicious code in user mode [J].
Sangeetha, R. .
2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2013, :146-149
[22]   Malicious Code Detection Using LLM [J].
Hossain, Al Amin ;
Kumar, Mithun P. K. ;
Zhang, Junjie ;
Amsaad, Fathi .
IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE, NAECON 2024, 2024, :414-416
[23]   A Study on Analysis of Malicious Code Behavior Information for Predicting Security Threats in New Environments [J].
Choi, Seul-Ki ;
Lee, Taejin ;
Kwak, Jin .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (03) :1611-1625
[24]   Classification and Analysis of Malicious Code Detection Techniques Based on the APT Attack [J].
Lee, Kyungroul ;
Lee, Jaehyuk ;
Yim, Kangbin .
APPLIED SCIENCES-BASEL, 2023, 13 (05)
[25]   A Detection Framework of Malicious Code Based on Multi-Classifiers Ensemble [J].
Dai, Chao ;
Pang, Jianmin ;
Yue, Feng ;
Cui, Pingfei ;
Sun, Di ;
Zhu, Liang .
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (06) :75-85
[26]   An Android Malicious Code Detection Method Based on Improved DCA Algorithm [J].
Wang, Chundong ;
Li, Zhiyuan ;
Gong, Liangyi ;
Mo, Xiuliang ;
Yang, Hong ;
Zhao, Yi .
ENTROPY, 2017, 19 (02)
[27]   Malicious Code Detection Technology Based on A3C Algorithm [J].
Xue, Yi ;
Shu, Hui ;
Bu, Wenjuan ;
Qu, Wu .
PROCEEDINGS OF 2020 IEEE 11TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2020), 2020, :116-120
[28]   Malicious code detection based on CNNs and multi-objective algorithm [J].
Cui, Zhihua ;
Du, Lei ;
Wang, Penghong ;
Cai, Xingjuan ;
Zhang, Wensheng .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2019, 129 :50-58
[29]   A Universal Malicious Documents Static Detection Framework Based on Feature Generalization [J].
Lu, Xiaofeng ;
Wang, Fei ;
Jiang, Cheng ;
Lio, Pietro .
APPLIED SCIENCES-BASEL, 2021, 11 (24)
[30]   An ensemble framework for interpretable malicious code detection [J].
Cheng, Jieren ;
Zheng, Jiachen ;
Yu, Xiaomei .
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (12) :10100-10117