Detecting Java']Java Compiled Malware using Machine Learning Techniques

被引:4
|
作者
Balan, Gheorghe [1 ]
Popescu, Adrian Stefan [1 ]
机构
[1] Alexandru Ioan Cuza Univ, Bitdefender Lab, Fac Comp Sci, Iasi, Romania
关键词
Machine learning; feature extraction; feature selection; !text type='java']java[!/text] malware; compiled code; hierarchical clustering;
D O I
10.1109/SYNASC.2018.00073
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Malicious software using Java Language in order to implement the attack evolved rapidly in the past years. Initially we were used to find malicious Applets and exploitation methods to escape the controlled environments and to gain access to victims. Nowadays, as a react to the security measurements implemented in browsers, it is common to distribute the malware through spear-phishing emails. This paper presents two methods to detect the Java malicious code. One method is using an unsupervised machine learning algorithm while the other is using the Perceptron algorithm in order to shape a detection model. Combining their capacities we obtained a very good solution to detect Java threats in a proactive manner and to make sure that the known malware variants are still detected. The detection is focused on the class files as a response to the Malware as a Service concept.
引用
收藏
页码:435 / 439
页数:5
相关论文
共 50 条
  • [1] Detecting Malware with Classification Machine Learning Techniques
    Yusof, Mohd Azahari Mohd
    Abdullah, Zubaile
    Ali, Firkhan Ali Hamid
    Sukri, Khairul Amin Mohamad
    Hussain, Hanizan Shaker
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (06) : 167 - 172
  • [2] Detecting Java']Java software similarities by using different clustering techniques
    Capiluppi, Andrea
    Di Ruscio, Davide
    Di Rocco, Juri
    Nguyen, Phuong T.
    Ajienka, Nemitari
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 2020, 122
  • [3] Detecting malicious Java']Java code using virtual machine auditing
    Soman, S
    Krintz, C
    Vigna, G
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE 12TH USENIX SECURITY SYMPOSIUM, 2003, : 153 - 167
  • [4] Detecting Integer Overflow Errors in Java']Java Source Code via Machine Learning
    Luo, Yu
    Xu, Weifeng
    Xu, Dianxiang
    [J]. 2021 IEEE 33RD INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI 2021), 2021, : 724 - 728
  • [5] Method Level Refactoring Prediction on Five Open Source Java']Java Projects using Machine Learning Techniques
    Kumar, Lov
    Satapathy, Shashank Mouli
    Murthy, Lalita Bhanu
    [J]. PROCEEDINGS OF THE 12TH INNOVATIONS ON SOFTWARE ENGINEERING CONFERENCE (ISEC), 2019,
  • [6] Data Analytics and Machine Learning with Java']Java
    Zhelev, Svetoslav
    Rozeva, Anna
    [J]. PROCEEDINGS OF THE 44TH INTERNATIONAL CONFERENCE "APPLICATIONS OF MATHEMATICS IN ENGINEERING AND ECONOMICS", 2018, 2048
  • [7] Detection of obfuscation in java']java malware
    Kumar, Renuka
    Vaishakh, Anand Raj Essar
    [J]. 1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 521 - 529
  • [8] A novel code representation for detecting Java']Java code clones using high-level and abstract compiled code representations
    Quradaa, Fahmi H.
    Shahzad, Sara
    Saeed, Rashad
    Sufyan, Mubarak M.
    [J]. PLOS ONE, 2024, 19 (05):
  • [9] Performance measurement of dynamically compiled Java']Java executions
    Newhall, T
    Miller, BP
    [J]. CONCURRENCY-PRACTICE AND EXPERIENCE, 2000, 12 (06): : 343 - 362
  • [10] Performance Analysis of Java']Java Virtual Machine for Machine Learning Workloads using Apache Spark
    Hema, N.
    Srinivasa, K. G.
    Chidambaram, Saravanan
    Saraswat, Sandeep
    Saraswati, Sujoy
    Ramachandra, Ranganath
    Huttanagoudar, Jayashree B.
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATICS AND ANALYTICS (ICIA' 16), 2016,