Malicious Code Forensics based on Data Mining

被引:0
作者
Li, Xiaohua [1 ]
Dong, Xiaomei [1 ]
Wang, Yulong [1 ]
机构
[1] Northeastern Univ, Sch Informat Sci & Engn, Shenyang, Peoples R China
来源
2013 10TH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (FSKD) | 2013年
关键词
computer forensics; malicious code; data mining; API call sequence; weighted FP-Growth algorithm;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
According to the characteristics of electronic evidence generated by malicious codes, a weighted FP-Growth frequent pattern mining algorithm was proposed for malicious code forensics. Different API call sequences were assigned different weights according to their threaten degree to obtain frequent patterns of serious malicious codes and more accurate analysis results. Based on the weighted FP-Growth algorithm, an analysis and forensics method for malicious codes was proposed. By monitoring the malicious code processes, registry, file recording and port number to record its behavior, electronic evidence of malicious codes was obtained and analyzed to generate the forensics report. Compared with the original FP-Growth algorithm, the weighted algorithm can obtain higher accuracy when used for evidence analysis. Specific examples also verified the feasibility of the method and the effect of the host.
引用
收藏
页码:978 / 983
页数:6
相关论文
共 8 条
[1]  
Agrawal R., 1994, P 20 INT C VER LARG, P487, DOI DOI 10.5555/645920.672836
[2]   EFFICIENT STRING MATCHING - AID TO BIBLIOGRAPHIC SEARCH [J].
AHO, AV ;
CORASICK, MJ .
COMMUNICATIONS OF THE ACM, 1975, 18 (06) :333-340
[3]  
CHRISTODORESCU M, 2007, P 6 JOINT M EUR SOFT, P5, DOI DOI 10.1145/1287624.1287628
[4]  
Han JW, 2000, SIGMOD RECORD, V29, P1
[5]   DDCFS: A Distributed Dynamic Computer Forensic System Based on Network [J].
Hu, Liang ;
Tang, Kuo ;
Shi, Guangkun ;
Nurbol ;
Zhao, Kuo .
ICICTA: 2009 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION, VOL IV, PROCEEDINGS, 2009, :53-56
[6]   Data mining methods for detection of new malicious executables [J].
Schultz, MG ;
Eskin, E ;
Zadok, E ;
Stolfo, SJ .
2001 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2001, :38-49
[7]  
Wang JH, 2003, 37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, P71
[8]   Dynamic Network Forensic Based Plug-In Architecture [J].
Wang, Wenqi ;
Li, Yong .
ICMECG: 2009 INTERNATIONAL CONFERENCE ON MANAGEMENT OF E-COMMERCE AND E-GOVERNMENT, PROCEEDINGS, 2009, :445-+