Simulation on static detection of malicious code based on behavior information gain

被引:0
|
作者
Wei, Pengcheng [1 ]
Shi, Chengxiang [1 ]
He, Fangcheng [2 ]
机构
[1] Chongqing Univ Educ, Sch Math & Informat Engn, Chongqing, Peoples R China
[2] Chongqing Univ Educ, Sch Foreign Languages & Literatures, Chongqing, Peoples R China
关键词
Behavior information gain; malicious code; static detection; feature selection method; dispersion degree; INTERNET;
D O I
10.3233/JIFS-179838
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
When the malicious code is detected by the current method, the features of the malicious code cannot be classified in detail. A static detection method of malicious code based on behavior information gain is proposed. The method uses the feature selection method of behavior information gain to get the average mutual information between different code types, and gives different types of feature libraries. On this basis, the character sets are fused and the sample characteristics of the malicious code are extracted. The dispersion degree of the sequence distribution of malicious code samples is measured, the distance vector of the plurality of eigenvectors is obtained, and the weighted matching of the features is performed. The malicious code is detected statically based on the matching result. The results demonstrated that the proposed method tends to be more accurate and provides a scientific basis for ensuring the security and stability of the Android operating system.
引用
收藏
页码:7683 / 7692
页数:10
相关论文
共 50 条
  • [1] Static detection and simulation of malicious code in a metallurgical master control station based on behavior information gain
    Hu, Tingfeng
    [J]. Engineering Intelligent Systems, 2020, 28 (01): : 15 - 22
  • [2] Malicious code detection based on heterogeneous information network
    Liu Y.
    Hou Y.
    Yan H.
    [J]. Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2022, 48 (02): : 258 - 265
  • [3] Static detection of application backdoorsDetecting both malicious software behavior and malicious indicators from the static analysis of executable code
    Chris Wysopal
    Chris Eng
    Tyler Shields
    [J]. Datenschutz und Datensicherheit - DuD, 2010, 34 (3) : 149 - 155
  • [4] Malicious Code Detection Model Based on Behavior Association
    Lansheng Han
    Mengxiao Qian
    Xingbo Xu
    Cai Fu
    Hamza Kwisaba
    [J]. Tsinghua Science and Technology, 2014, 19 (05) : 508 - 515
  • [5] Malicious Code Detection Model Based on Behavior Association
    Han, Lansheng
    Qian, Mengxiao
    Xu, Xingbo
    Fu, Cai
    Kwisaba, Hamza
    [J]. TSINGHUA SCIENCE AND TECHNOLOGY, 2014, 19 (05) : 508 - 515
  • [6] A Malicious Code Detection Method Based on Ensemble Learning of Behavior
    Xu X.-B.
    Zhang W.-B.
    He C.
    Luo Y.
    [J]. Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2019, 42 (04): : 89 - 95
  • [7] A malicious code detection method based on integrated behavior characterization
    Liu, Wei-Wei
    Shi, Yong
    Guo, Yu
    Han, Zhen
    Shen, Chang-Xiang
    [J]. Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2009, 37 (04): : 696 - 700
  • [8] A Dynamic and Static Combined Android Malicious Code Detection Model based on SVM
    Du, Jinran
    Chen, Huajun
    Zhong, Weijie
    Liu, Zhen
    Xu, Aidong
    [J]. 2018 5TH INTERNATIONAL CONFERENCE ON SYSTEMS AND INFORMATICS (ICSAI), 2018, : 801 - 806
  • [9] THE BEHAVIOR ORIENTED DETECTION OF MALICIOUS CODE OVERVIEW
    Deng, Jin-Cheng
    Liu, Dan
    Hu, Yue
    Liang, Zong-Wen
    [J]. 2012 INTERNATIONAL CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (LCWAMTIP), 2012, : 235 - 238
  • [10] Early detection of malicious behavior in javascript code
    Schütt, Kristof
    Kloft, Marius
    Bikadorov, Alexander
    Rieck, Konrad
    [J]. Proceedings of the ACM Conference on Computer and Communications Security, 2012, : 15 - 24