Malicious VBScript Detection Algorithm Based on Data-Mining Techniques

被引:0
|
作者
Wael, Doaa [1 ]
Shosha, Ahmed [2 ]
Sayed, Samir G. [3 ]
机构
[1] Nile Univ, Comp Emergency Readiness, Cairo, Egypt
[2] Nile Univ, Cairo, Egypt
[3] Helwan Univ, Elect Commun & Comp Dept, Cairo, Egypt
关键词
Malicious scripts; Malware analysis; VBScripts;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malware attacks are amongst the most common security threats. Not only malware incidents are rapidly increasing, but also the attack methodologies are getting more complicated. Moreover malware writers expand in using different platforms and languages. This raises the need for new detection methods which support more reliable, low resource consuming and fast solutions. In this paper, a new algorithm has been proposed based on machine learning techniques and static analysis features to detect malicious scripts specifically for VBScript files. Experimental results show that the proposed algorithm can achieve 97% detection ratio.
引用
收藏
页码:112 / 116
页数:5
相关论文
共 50 条
  • [1] Enhanced Approach to Detect Malicious VBScript Files Based on Data Mining Techniques
    Wael, Doaa
    Sayed, Samir G.
    AbdelBaki, Nashwa
    [J]. 9TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN-2018) / 8TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH-2018), 2018, 141 : 552 - 558
  • [2] The Algorithm of Malicious Code Detection Based on Data Mining
    Yang, Yubo
    Zhao, Yang
    Liu, Xiabi
    [J]. GREEN ENERGY AND SUSTAINABLE DEVELOPMENT I, 2017, 1864
  • [3] DATA-MINING BASED FAULT DETECTION
    Ma Hongguang Han Chongzhao (Xi’an Jiaotong University
    [J]. Journal of Electronics(China), 2005, (06) : 39 - 45
  • [4] DATA-MINING BASED FAULT DETECTION
    Ma Hongguang Han Chongzhao Xian Jiaotong University Xian China Wang Guohua Xu Jianfeng Zhu Xiaofei Research Institute of High Technology Xian China
    [J]. Journal of Electronics., 2005, (06)
  • [5] Object detection of mobile robot using data-mining algorithm
    Lee, Jin-Seob
    Kwon, Ji-Wook
    Chwa, Dongkyoung
    Hong, Suk-Kyo
    [J]. 2007 INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND SYSTEMS, VOLS 1-6, 2007, : 800 - 803
  • [6] Knowledge Management in the Industry Based on the Use of Data-Mining Techniques
    He, Mao
    Chen, Juan
    [J]. 2008 7TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-23, 2008, : 171 - +
  • [7] Detection of Malicious Requests on Web Logs Using Data Mining Techniques
    Sahin, Mehmet Emin
    Ozdemir, Suat
    [J]. 2019 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2019, : 463 - 468
  • [8] Research on improved Data-Mining Algorithm based on Strong Correlation
    Hu, Chunhong
    Wang, Zhengqiang
    [J]. SECOND INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING: WGEC 2008, PROCEEDINGS, 2008, : 423 - +
  • [9] Detection and prediction of anomalous behaviors of enterprise's employees based on data-mining and optimization algorithm
    Zhang, Xiao
    Meng, Yutong
    [J]. SCIENTIFIC REPORTS, 2024, 14 (01):
  • [10] Application of Data-Mining Techniques in Customer Segmentation
    Polackova, Julie
    [J]. AGRARIAN PERSPECTIVES, 2011, : 403 - 408