PyComm: Malicious commands detection model for python']python scripts

被引:1
作者
Zhou, Anmin [1 ]
Huang, Tianyi [1 ]
Huang, Cheng [1 ]
Li, Dunhan [1 ]
Song, Chuangchuang [2 ]
机构
[1] Sichuan Univ, Sch Cyber Sci & Engn, Chengdu 610207, Peoples R China
[2] China Informat Technol Secur Evaluat Ctr, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Cyber security; malicious script detection; malicious command; machine learning; static analysis;
D O I
10.3233/JIFS-211557
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Python is a concise language which can be used to build lightweight tools or dynamic object-orientated applications. The various attributes of Python have made it attractive to numerous malware authors. Attackers often embed malicious shell commands into Python scripts for illegal operations. However, traditional static analysis methods are not feasible to detect this kind of attack because they focus on common features and failure in finding those malicious commands. On the other hand, dynamic analysis is not optimal in this case for its time-consuming and inefficient. In this paper, we propose PyComm, a model for detecting malicious commands in Python scripts with multidimensional features based on machine learning, which considers both 12 statistical features and string sequences of Python source code. Meanwhile, three comparison experiments are designed to evaluate the validity of proposed method. Experimental results show that presented model has achieved an excellent performance based on those practical features and random forest (RF) algorithm, obtained an accuracy of 0.955 with a recall of 0.943.
引用
收藏
页码:2261 / 2273
页数:13
相关论文
empty
未找到相关数据