Associative Classification and Post-processing Techniques used for Malware Detection

被引:3
|
作者
Ye, Yanfang [1 ]
Jiang, Qingshan [2 ]
Zhuang, Weiwei [2 ]
机构
[1] Xiamen Univ, Dept Comp Sci, Xiamen 361005, Peoples R China
[2] Xiamen Univ, Software Sch, Xiamen 361005, Peoples R China
关键词
Malware Detection; Windows API Sequence; Associative Classification; Post-processing;
D O I
10.1109/IWASID.2008.4688391
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Numerous attacks made by the malware have presented serious threats to the security of computer users. Unfortunately, along with the development of the malware writing techniques, the number of file samples that need to be analyzed is constantly increasing on a daily basis. An automatic and robust tool to analyze and classify the file samples is the need of the hour. In this paper, resting on the analysis of Windows API execution sequences called by PE files, we use associative classification and post-processing techniques for malware detection. Promising experimental results demonstrate that the accuracy and efficiency of our malware detection method outperform popular anti-virus scanners such as Norton AntiVirus and Dr. Web, as well as previous data mining based detection systems which employed Naive Bayes, Support Vector Machine (SVM) and Decision Tree techniques. In particular, the post-processing techniques we adopt can greatly reduce the number of generated rules which make it easy for the human analysts to identify the useful ones.
引用
收藏
页码:276 / +
页数:2
相关论文
共 50 条
  • [1] CIMDS: Adapting Postprocessing Techniques of Associative Classification for Malware Detection
    Ye, Yanfang
    Li, Tao
    Jiang, Qingshan
    Wang, Youyu
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2010, 40 (03): : 298 - 307
  • [2] Post-processing of associative classification rules using closed sets
    Liu, Huawen
    Sun, Jigui
    Zhang, Huijie
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2009, 36 (03) : 6659 - 6667
  • [3] Introduction to post-processing techniques
    Jiru, Filip
    [J]. EUROPEAN JOURNAL OF RADIOLOGY, 2008, 67 (02) : 202 - 217
  • [4] Implementation of Intelligent Malware Detection System Using Post Processing Techniques
    Kokate, S. R.
    Salunke, S. G.
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA), 2017,
  • [5] Novel post-processing methods used in detection of blotches in image sequences
    Ghaderi, M
    Kasaei, S
    [J]. AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2004, 58 (01) : 58 - 64
  • [6] POST-PROCESSING TECHNIQUES FOR RADIOMETRIC IMAGES
    Siegenthaler, Stefan
    Canavero, Marco
    Murk, Axel
    [J]. 2012 IEEE INTERNATIONAL GEOSCIENCE AND REMOTE SENSING SYMPOSIUM (IGARSS), 2012, : 2316 - 2319
  • [7] Post-Processing Temporal Action Detection
    Nag, Sauradip
    Zhu, Xiatian
    Song, Yi-Zhe
    Xiang, Tao
    [J]. 2023 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2023, : 18837 - 18845
  • [8] Post-processing for retinal vessel detection
    Wang, Xiaohong
    Jiang, Xudong
    [J]. TENTH INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2018), 2018, 10806
  • [9] Post-processing techniques for a speaker diarization system
    Tavarez, David
    Navas, Eva
    Erro, Daniel
    Saratxaga, Ibon
    Hernaez, Inma
    [J]. PROCESAMIENTO DEL LENGUAJE NATURAL, 2012, (49): : 109 - 115
  • [10] On the post-processing techniques for elastoplastic axisymmetrical problems
    Yazdani, AA
    Gakwaya, A
    Dhatt, G
    [J]. COMPUTATIONAL MECHANICS, 1999, 24 (01) : 14 - 28