An ensemble framework for interpretable malicious code detection

被引:10
作者
Cheng, Jieren [1 ]
Zheng, Jiachen [2 ]
Yu, Xiaomei [3 ]
机构
[1] Hainan Univ, Sch Comp Sci & Cyberspace Secur, Haikou, Hainan, Peoples R China
[2] East China Normal Univ, Sch Data Sci & Engn, Shanghai, Peoples R China
[3] Shandong Normal Univ, Sch Informat Sci & Engn, Jinan 250358, Peoples R China
关键词
feature extraction; knowledge graph; machine learning; malicious code; malware detection; ANDROID MALWARE DETECTION; NETWORKS;
D O I
10.1002/int.22310
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Malicious code is an ever-growing security threats to computer systems and networks, while malware detection provides effective defense against malicious codes. In this paper, a brief overview is presented on currently prevalent methods to detect malicious codes, including signature-based methods, behavioral-based detection and machine learning (ML) based ones. More specifically, the potentially effective malicious features are summarized and the novel methods using ML are deeply discussed. Furthermore, an ensemble interpretable framework is explored for automatic and efficient malicious code detection. Based on the knowledge graph of malware, the novel framework inclines to achieve robust malware detection even confronted with unseen malicious codes. Finally, both advantages and disadvantages are discussed and experimental results are outlined to verify the effectiveness of the novel methods.
引用
收藏
页码:10100 / 10117
页数:18
相关论文
共 60 条
[11]  
Firdausi I, 2010, P 2 INT C ADV COMP C
[12]  
Haoran Guo, 2010, 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS 2010), P411, DOI 10.1109/ICICISYS.2010.5658586
[13]  
Heo J, 2019, NEURIPS 2019 ICCV WO
[14]   Sparse network embedding for community detection and sign prediction in signed social networks [J].
Hu, Baofang ;
Wang, Hong ;
Yu, Xiaomei ;
Yuan, Weihua ;
He, Tianwen .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (01) :175-186
[15]  
[化盈盈 Hua Yingying], 2020, [信息安全学报, Journal of Cyber Security], V5, P1
[16]  
Idika N, 2007, SURVEY MALWARE DETEC, P1
[17]   Behavioral detection of malware: from a survey towards an established taxonomy [J].
Jacob, Gregoire ;
Debar, Herve ;
Filiol, Eric .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2008, 4 (03) :251-266
[18]   PAN: Pipeline assisted neural networks model for data-to-text generation in social internet of things [J].
Jiang, Nan ;
Chen, Jing ;
Zhou, Ri-Gui ;
Wu, Changxing ;
Chen, Honglong ;
Zheng, Jiaqi ;
Wan, Tao .
INFORMATION SCIENCES, 2020, 530 :167-179
[19]   MAN: Mutual Attention Neural Networks Model for Aspect-Level Sentiment Classification in SIoT [J].
Jiang, Nan ;
Tian, Fang ;
Li, Jin ;
Yuan, Xu ;
Zheng, Jiaqi .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (04) :2901-2913
[20]   Toward optimal participant decisions with voting-based incentive model for crowd sensing [J].
Jiang, Nan ;
Xu, Dong ;
Zhou, Jie ;
Yan, Hongyang ;
Wan, Tao ;
Zheng, Jiaqi .
INFORMATION SCIENCES, 2020, 512 :1-17