BEHAVIOR-BASED MALICIOUS EXECUTABLES DETECTION BY MULTI-CLASS SVM

被引:0
作者
Zou, Meng-song [1 ]
Han, Lan-sheng [1 ]
Liu, Qi-wen [1 ]
Liu, Ming [1 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Lab Informat Secur, Wuhan 430074, Peoples R China
来源
2009 IEEE YOUTH CONFERENCE ON INFORMATION, COMPUTING AND TELECOMMUNICATION, PROCEEDINGS | 2009年
关键词
Behavior-based detection; Feature extraction; Malicious executable; Multi-class SVM;
D O I
10.1109/YCICT.2009.5382354
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
As more polymorphic malicious codes coming into being, traditional anti-virus methods can not satisfy the current need. In order to achieve some specific functions, malicious codes must have some behaviors which are different from that of the normal programs. Focus on the difference between normal programs and the malicious codes the paper applies Support Vector Machine (SVM) and creates a space of virus API feature vector and a hyper-plane to divide the API space into two parts: malicious codes and normal program. Moreover, behaviors of different kinds of malicious codes are collected and 1-v-1 Multi-class SVM is introduced to detect those behaviors. Furthermore the paper constructs the application structure and selects large amount of test executable samples. Through statistics, analysis and calculation on those samples, the results verify our method.
引用
收藏
页码:331 / 334
页数:4
相关论文
共 8 条
[1]  
ABE S, 2002, ESANN 2002 P
[2]   LIBSVM: A Library for Support Vector Machines [J].
Chang, Chih-Chung ;
Lin, Chih-Jen .
ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2011, 2 (03)
[3]  
Kolter JZ, 2004, P 10 ACM SIGKDD INT
[4]  
PIETREK M, 1994, MICROSOFT SYSTEMS J, V9
[5]   Data mining methods for detection of new malicious executables [J].
Schultz, MG ;
Eskin, E ;
Zadok, E ;
Stolfo, SJ .
2001 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2001, :38-49
[6]  
WANG S, 2007, COMPUTER APPL, V27
[7]  
WANG TY, 2008, IEEE 8 INT C COMP IN
[8]  
XU JY, 2004, P 4 INT C HYBR INT S