Simulation on static detection of malicious code based on behavior information gain

被引:1
作者
Wei, Pengcheng [1 ]
Shi, Chengxiang [1 ]
He, Fangcheng [2 ]
机构
[1] Chongqing Univ Educ, Sch Math & Informat Engn, Chongqing, Peoples R China
[2] Chongqing Univ Educ, Sch Foreign Languages & Literatures, Chongqing, Peoples R China
关键词
Behavior information gain; malicious code; static detection; feature selection method; dispersion degree; INTERNET;
D O I
10.3233/JIFS-179838
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
When the malicious code is detected by the current method, the features of the malicious code cannot be classified in detail. A static detection method of malicious code based on behavior information gain is proposed. The method uses the feature selection method of behavior information gain to get the average mutual information between different code types, and gives different types of feature libraries. On this basis, the character sets are fused and the sample characteristics of the malicious code are extracted. The dispersion degree of the sequence distribution of malicious code samples is measured, the distance vector of the plurality of eigenvectors is obtained, and the weighted matching of the features is performed. The malicious code is detected statically based on the matching result. The results demonstrated that the proposed method tends to be more accurate and provides a scientific basis for ensuring the security and stability of the Android operating system.
引用
收藏
页码:7683 / 7692
页数:10
相关论文
共 50 条
[41]   Malicious Code Forensics based on Data Mining [J].
Li, Xiaohua ;
Dong, Xiaomei ;
Wang, Yulong .
2013 10TH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (FSKD), 2013, :978-983
[42]   Research and application of internal malicious code threat detection system [J].
Zhang Xiaojun ;
Li Yingcai ;
Zhang Fuqiang ;
Zhang Qian ;
Han Li .
PROCEEDINGS OF 2021 2ND INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INFORMATION SYSTEMS (ICAIIS '21), 2021,
[43]   Malicious code dynamic traffic camouflage detection based on deep reinforcement learning in power system [J].
Tang Xiaoqiang ;
He Bingzhe .
ENERGY REPORTS, 2022, 8 :1424-1435
[44]   Automatic Malicious Code Classification System through Static Analysis Using Machine Learning [J].
Kim, Sungjoong ;
Yeom, Seongkyu ;
Oh, Haengrok ;
Shin, Dongil ;
Shin, Dongkyoo .
SYMMETRY-BASEL, 2021, 13 (01) :1-11
[45]   A Novel Immune-Inspired Method for Malicious Code Extraction and Detection [J].
Zhang, Yu ;
Song, Liping ;
He, Yuliang .
APPLIED INFORMATICS AND COMMUNICATION, PT III, 2011, 226 :501-+
[46]   Intelligent Security Cycle: A Rule Based Run Time Malicious Code Detection Technique for SOAP Messages [J].
Mohsin, Ahmad ;
Asghar, Sundas ;
Naeem, Tariq .
PROCEEDINGS OF THE 2016 19TH INTERNATIONAL MULTI-TOPIC CONFERENCE (INMIC), 2016, :36-45
[47]   A Novel Immune-inspired Method for Malicious Code Extraction and Detection [J].
Zhang, Yu ;
Song, Liping ;
He, Yuliang .
2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL III, 2010, :292-295
[48]   Applying machine learning techniques for detection of malicious code in network traffic [J].
Elovici, Yuval ;
Shabtai, Asaf ;
Moskovitch, Robert ;
Tahan, Gil ;
Glezer, Chanan .
KI 2007: ADVANCES IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2007, 4667 :44-+
[49]   Visualization Feature and CNN Based Homology Classification of Malicious Code [J].
CHU Qianfeng ;
LIU Gongshen ;
ZHU Xinyu .
Chinese Journal of Electronics, 2020, 29 (01) :154-160
[50]   Visualization Feature and CNN Based Homology Classification of Malicious Code [J].
Chu, Qianfeng ;
Liu, Gongshen ;
Zhu, Xinyu .
CHINESE JOURNAL OF ELECTRONICS, 2020, 29 (01) :154-160