New malicious code detection based on N-gram analysis and rough set theory

被引:0
|
作者
Zhang, Boyun [1 ,2 ]
Yin, Jianping [1 ]
Hao, Jingbo [1 ]
Wang, Shulin [1 ]
Zhang, Dingxing [1 ]
Tang, Wensheng [1 ]
机构
[1] Natl Univ Def Technol, Sch Comp Sci, Changsha 410073, Peoples R China
[2] Hunan Publ Secur Coll, Dept Comp Sci, Changsha 410138, Hunan, Peoples R China
关键词
D O I
10.1109/ICCIAS.2006.295252
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Motivated by the standard signature-based technique for detecting viruses, we explore the idea of automatically detecting malicious code using the N-gram analysis. The method is based on statistical learning and not strictly dependent on certain viruses. We propose the use of rough set theory (RST) to reduce the feature dimension. An efficient implementation to calculate relative core, based on positive region definition is presented also. The k nearest neighbor (KNN) and support vector machine (SVM) classifiers are used to categorize a program as either normal or abnormal. The experimental results are promising and show that the proposed scheme results in low rate of false positive.
引用
收藏
页码:1229 / 1232
页数:4
相关论文
共 50 条
  • [21] Source code author identification based on n-gram author profiles
    Frantzeskou, Georgia
    Stamatatos, Efstathios
    Gritzalis, Stefanos
    Katsikas, Sokratis
    [J]. ARTIFICIAL INTELLIGENCE APPLICATIONS AND INNOVATIONS, 2006, 204 : 508 - +
  • [22] Feature n-gram set based software zero-watermarking
    Lu, Bin
    Liu, Fenlin
    Ge, Xin
    Wang, Ping
    [J]. 2008 INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING AND 2008 INTERNATIONAL PACIFIC WORKSHOP ON WEB MINING AND WEB-BASED APPLICATION, 2008, : 607 - 611
  • [23] N-GRAM ANALYSIS FOR SLEEPING CELL DETECTION IN LTE NETWORKS
    Chernogorov, Fedor
    Ristaniemi, Tapani
    Brigatti, Kimmo
    Chernov, Sergey
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2013, : 4439 - 4443
  • [24] Using N-Gram Variations in Static Analysis for Malware Detection
    Radovancovici, Marco
    Galis, Darius
    Pungila, Ciprian
    [J]. 2022 24TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING, SYNASC, 2022, : 195 - 199
  • [25] Host Based Intrusion Detection System Using Frequency Analysis of N-Gram Terms
    Subba, Basant
    Biswas, Santosh
    Karmakar, Sushata
    [J]. TENCON 2017 - 2017 IEEE REGION 10 CONFERENCE, 2017, : 2006 - 2011
  • [26] N-gram Analysis of a Mongolian Text
    Altangerel, Khuder
    Tsend, Ganbat
    Jalsan, Khash-Erdene
    [J]. IFOST 2008: PROCEEDING OF THE THIRD INTERNATIONAL FORUM ON STRATEGIC TECHNOLOGIES, 2008, : 258 - 259
  • [27] N-GRAM ANALYSIS IN THE ENGINEERING DOMAIN
    Leary, Martin
    Pearson, Geoff
    Burvill, Colin
    Mazur, Maciej
    Subic, Aleksandar
    [J]. PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON ENGINEERING DESIGN (ICED 11): IMPACTING SOCIETY THROUGH ENGINEERING DESIGN, VOL 6: DESIGN INFORMATION AND KNOWLEDGE, 2011, 6 : 414 - 423
  • [28] Exploiting n-gram location for intrusion detection
    Angiulli, Fabrizio
    Argento, Luciano
    Furfaro, Angelo
    [J]. 2015 IEEE 27TH INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI 2015), 2015, : 1093 - 1098
  • [29] N-gram analysis based on zero-suppressed BDDs
    Kurai, Ryutaro
    Minato, Shin-Ichi
    Zeugmarm, Thomas
    [J]. NEW FRONTIERS IN ARTIFICIAL INTELLIGENCE, 2007, 4384 : 289 - 300
  • [30] A discriminative method for protein remote homology detection based on N-Gram
    Xie, S.
    Li, P.
    Jiang, Y.
    Zhao, Y.
    [J]. GENETICS AND MOLECULAR RESEARCH, 2015, 14 (01): : 69 - 78