Simulation on static detection of malicious code based on behavior information gain

被引:1
作者
Wei, Pengcheng [1 ]
Shi, Chengxiang [1 ]
He, Fangcheng [2 ]
机构
[1] Chongqing Univ Educ, Sch Math & Informat Engn, Chongqing, Peoples R China
[2] Chongqing Univ Educ, Sch Foreign Languages & Literatures, Chongqing, Peoples R China
关键词
Behavior information gain; malicious code; static detection; feature selection method; dispersion degree; INTERNET;
D O I
10.3233/JIFS-179838
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
When the malicious code is detected by the current method, the features of the malicious code cannot be classified in detail. A static detection method of malicious code based on behavior information gain is proposed. The method uses the feature selection method of behavior information gain to get the average mutual information between different code types, and gives different types of feature libraries. On this basis, the character sets are fused and the sample characteristics of the malicious code are extracted. The dispersion degree of the sequence distribution of malicious code samples is measured, the distance vector of the plurality of eigenvectors is obtained, and the weighted matching of the features is performed. The malicious code is detected statically based on the matching result. The results demonstrated that the proposed method tends to be more accurate and provides a scientific basis for ensuring the security and stability of the Android operating system.
引用
收藏
页码:7683 / 7692
页数:10
相关论文
共 50 条
[31]   A Novel Solutions for Malicious Code Detection and Family Clustering Based on Machine Learning [J].
Yang, Hangfeng ;
Li, Shudong ;
Wu, Xiaobo ;
Lu, Hui ;
Han, Weihong .
IEEE ACCESS, 2019, 7 :148853-148860
[32]   PBDG: a malicious code detection method based on precise behaviour dependency graph [J].
Tang, Chenghua ;
Yang, Mengmeng ;
Gao, Qingze ;
Qiang, Baohua .
INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2024, 23 (02) :163-189
[33]   A Multiple Pattern Matching Method for Malicious Code Detection [J].
Huang, Der-Chen ;
Lo, Hung-Cheng ;
Lai, Ping-Liang ;
Chen, Wei-Ming .
JOURNAL OF INTERNET TECHNOLOGY, 2012, 13 (02) :181-193
[34]   Malicious attack detection based on traffic-flow information fusion [J].
Chen, Ye ;
Lai, Yingxu ;
Zhang, Zhaoyi ;
Li, Hanmei ;
Wang, Yuhang .
2022 IFIP NETWORKING CONFERENCE (IFIP NETWORKING), 2022,
[35]   Malicious code detection for Android using Instruction Signatures [J].
Hu Ge ;
Li Ting ;
Dong Hang ;
Yu Hewei ;
Zhang Miao .
2014 IEEE 8TH INTERNATIONAL SYMPOSIUM ON SERVICE ORIENTED SYSTEM ENGINEERING (SOSE), 2014, :332-337
[36]   A Review of Static Detection Methods for Android Malicious Application [J].
Pan J. ;
Cui Z. ;
Lin G. ;
Chen X. ;
Zheng L. .
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (08) :1875-1894
[37]   Feature fusion-based malicious code detection with dual attention mechanism and BiLSTM [J].
Shen, Gaoning ;
Chen, Zhixiang ;
Wang, Hui ;
Chen, Heng ;
Wang, Shuqi .
COMPUTERS & SECURITY, 2022, 119
[38]   K-Means Clustering Analysis Based on Adaptive Weights for Malicious Code Detection [J].
Sun Haoliang ;
Wang Dawei ;
Zhang Ying .
2019 IEEE 11TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN 2019), 2019, :652-656
[39]   A New Automatic Detection System Design of Malicious Behavior Based on Software Behavior Sequence [J].
Jiang, Chong ;
Qu, Qifu .
2020 10TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY (ICIST), 2020, :58-64
[40]   Decompiled APK based malicious code classification [J].
Mateless, Roni ;
Rejabek, Daniel ;
Margalit, Oded ;
Moskovitch, Robert .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 110 :135-147