New malicious code detection based on N-gram analysis and rough set theory

被引:0
|
作者
Zhan, Boyun [1 ]
Yin, Jianping [1 ]
Hao, Jingbo [1 ]
Wang, Shulin [1 ]
Zhang, Dingxing [1 ]
机构
[1] Natl Univ Def Technol, Sch Comp Sci, Changsha 410073, Peoples R China
来源
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Motivated by the standard signature-based technique for detecting viruses, we explore the idea of automatically detecting malicious code using the N-gram analysis. The method is based on statistical learning and not strictly dependent on certain viruses. We propose the use of rough set theory to reduce the feature dimension. An efficient implementation to calculate relative core, based on positive region definition is presented also. The k nearest neighbor and support vector machine classifiers are used to categorize a program as either normal or abnormal. The experimental results are promising and show that the proposed scheme results in low rate of false positive.
引用
收藏
页码:626 / 633
页数:8
相关论文
共 50 条
  • [1] New malicious code detection based on N-gram analysis and rough set theory
    Zhang, Boyun
    Yin, Jianping
    Hao, Jingbo
    Wang, Shulin
    Zhang, Dingxing
    Tang, Wensheng
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1229 - 1232
  • [2] N-gram-based detection of new malicious code
    Abou-Assaleh, T
    Cercone, N
    Keselj, V
    Sweidan, R
    [J]. PROCEEDINGS OF THE 28TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATION CONFERENCE, WORKSHOP AND FAST ABSTRACTS, 2004, : 41 - 42
  • [3] Boosting feature selection in a new non-adjacent N-gram for malicious code detection
    [J]. Parvin, Hamid (parvin@iust.ac.ir), 1600, CRL Publishing (22):
  • [4] Malicious Domain Names Detection Algorithm Based on N-Gram
    Zhao, Hong
    Chang, Zhaobin
    Bao, Guangbin
    Zeng, Xiangyan
    [J]. JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS, 2019, 2019
  • [5] A new N-gram feature extraction-selection method for malicious code
    School of Computer Engineering, Iran University of Science and Technology , Tehran, Iran
    [J]. Lect. Notes Comput. Sci., PART 2 (98-107):
  • [6] A New N-gram Feature Extraction-Selection Method for Malicious Code
    Parvin, Hamid
    Minaei, Behrouz
    Karshenas, Hossein
    Beigi, Akram
    [J]. ADAPTIVE AND NATURAL COMPUTING ALGORITHMS, PT II, 2011, 6594 : 98 - 107
  • [7] On the Impact of Tokenizer and Parameters on N-Gram Based Code Analysis
    Jimenez, Matthieu
    Cordy, Maxime
    Le Traon, Yves
    Papadakis, Mike
    [J]. PROCEEDINGS 2018 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME), 2018, : 437 - 448
  • [8] Association Analysis and N-Gram Based Detection of Incorrect Arguments
    Li, Chao
    Liu, Hui
    [J]. Ruan Jian Xue Bao/Journal of Software, 2018, 29 (08): : 2243 - 2257
  • [9] Code Artificiality: A Metric for the Code Stealth Based on an N-gram Model
    Kanzaki, Yuichiro
    Monden, Akito
    Collberg, Christian
    [J]. 2015 IEEE/ACM 1ST INTERNATIONAL WORKSHOP ON SOFTWARE PROTECTION (SPRO), 2015, : 31 - 37
  • [10] N-gram analysis for computer virus detection
    Reddy, D. Krishna Sandeep
    Pujari, Arun K.
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2006, 2 (03): : 231 - 239