An ensemble framework for interpretable malicious code detection

被引:10
作者
Cheng, Jieren [1 ]
Zheng, Jiachen [2 ]
Yu, Xiaomei [3 ]
机构
[1] Hainan Univ, Sch Comp Sci & Cyberspace Secur, Haikou, Hainan, Peoples R China
[2] East China Normal Univ, Sch Data Sci & Engn, Shanghai, Peoples R China
[3] Shandong Normal Univ, Sch Informat Sci & Engn, Jinan 250358, Peoples R China
关键词
feature extraction; knowledge graph; machine learning; malicious code; malware detection; ANDROID MALWARE DETECTION; NETWORKS;
D O I
10.1002/int.22310
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Malicious code is an ever-growing security threats to computer systems and networks, while malware detection provides effective defense against malicious codes. In this paper, a brief overview is presented on currently prevalent methods to detect malicious codes, including signature-based methods, behavioral-based detection and machine learning (ML) based ones. More specifically, the potentially effective malicious features are summarized and the novel methods using ML are deeply discussed. Furthermore, an ensemble interpretable framework is explored for automatic and efficient malicious code detection. Based on the knowledge graph of malware, the novel framework inclines to achieve robust malware detection even confronted with unseen malicious codes. Finally, both advantages and disadvantages are discussed and experimental results are outlined to verify the effectiveness of the novel methods.
引用
收藏
页码:10100 / 10117
页数:18
相关论文
共 60 条
[1]  
[Anonymous], 2003, P 12 C USENIX SEC S
[2]  
[Anonymous], 2007, 23 ANN COMP SEC APPL
[3]   Visualizing a field of research: A methodology of systematic scientometric reviews [J].
Chen, Chaomei ;
Song, Min .
PLOS ONE, 2019, 14 (10)
[4]  
Christodorescu Mihai, 2008, 1st India Software Engineering Conference. ISEC 2008, P5
[5]   Service-oriented mobile malware detection system based on mining strategies [J].
Cui, Baojiang ;
Jin, Haifeng ;
Carullo, Giuliana ;
Liu, Zheli .
PERVASIVE AND MOBILE COMPUTING, 2015, 24 :101-116
[6]   A comparison of static, dynamic, and hybrid analysis for malware detection [J].
Damodaran A. ;
Troia F.D. ;
Visaggio C.A. ;
Austin T.H. ;
Stamp M. .
Journal of Computer Virology and Hacking Techniques, 2017, 13 (01) :1-12
[7]   A Survey on Automated Dynamic Malware-Analysis Techniques and Tools [J].
Egele, Manuel ;
Scholte, Theodoor ;
Kirda, Engin ;
Kruegel, Christopher .
ACM COMPUTING SURVEYS, 2012, 44 (02)
[8]  
Elhadi Ammar Ahmed E., 2012, American Journal of Applied Sciences, V9, P283, DOI 10.3844/ajassp.2012.283.288
[9]   HDM-Analyser: a hybrid analysis approach based on data mining techniques for malware detection [J].
Eskandari, Mojtaba ;
Khorshidpour, Zeinab ;
Hashemi, Sattar .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2013, 9 (02) :77-93
[10]   A graph mining approach for detecting unknown malwares [J].
Eskandari, Mojtaba ;
Hashemi, Sattar .
JOURNAL OF VISUAL LANGUAGES AND COMPUTING, 2012, 23 (03) :154-162