New malicious code detection based on N-gram analysis and rough set theory

被引:0
|
作者
Zhang, Boyun [1 ,2 ]
Yin, Jianping [1 ]
Hao, Jingbo [1 ]
Wang, Shulin [1 ]
Zhang, Dingxing [1 ]
Tang, Wensheng [1 ]
机构
[1] Natl Univ Def Technol, Sch Comp Sci, Changsha 410073, Peoples R China
[2] Hunan Publ Secur Coll, Dept Comp Sci, Changsha 410138, Hunan, Peoples R China
关键词
D O I
10.1109/ICCIAS.2006.295252
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Motivated by the standard signature-based technique for detecting viruses, we explore the idea of automatically detecting malicious code using the N-gram analysis. The method is based on statistical learning and not strictly dependent on certain viruses. We propose the use of rough set theory (RST) to reduce the feature dimension. An efficient implementation to calculate relative core, based on positive region definition is presented also. The k nearest neighbor (KNN) and support vector machine (SVM) classifiers are used to categorize a program as either normal or abnormal. The experimental results are promising and show that the proposed scheme results in low rate of false positive.
引用
收藏
页码:1229 / 1232
页数:4
相关论文
共 50 条
  • [41] A variant of n-gram based language classification
    Tomovic, Andrija
    Janicic, Predrag
    [J]. AI(ASTERISK)IA 2007: ARTIFICIAL INTELLIGENCE AND HUMAN-ORIENTED COMPUTING, 2007, 4733 : 410 - +
  • [42] Bugram: Bug Detection with N-gram Language Models
    Wang, Song
    Chollak, Devin
    Movshovitz-Attias, Dana
    Tan, Lin
    [J]. 2016 31ST IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE), 2016, : 708 - 719
  • [43] An evaluation of n-gram correspondence models for transliteration detection
    Department of Information Systems, SCIT, CoCIS, Makerere University, Kampala, Uganda
    [J]. Lect. Notes Electr. Eng., (615-622):
  • [44] A quantitative approach for intrusions detection and prevention based on statistical n-gram models
    Boulaiche, Ammar
    Bouzayani, Hatem
    Adi, Kamel
    [J]. ANT 2012 AND MOBIWIS 2012, 2012, 10 : 450 - 457
  • [45] BHMDC: A byte and hex n-gram based malware detection and classification method
    Tang, Yonghe
    Qi, Xuyan
    Jing, Jing
    Liu, Chunling
    Dong, Weiyu
    [J]. COMPUTERS & SECURITY, 2023, 128
  • [46] Sentiment Analysis Using N-gram Technique
    Chidananda, Himadri Tanaya
    Das, Debashis
    Sagnika, Santwana
    [J]. PROGRESS IN COMPUTING, ANALYTICS AND NETWORKING, ICCAN 2017, 2018, 710 : 359 - 367
  • [47] Efficient n-gram analysis in R with cmscu
    David W. Vinson
    Jason K. Davis
    Suzanne S. Sindi
    Rick Dale
    [J]. Behavior Research Methods, 2016, 48 : 909 - 921
  • [48] Detection Method of WEB Malicious Code based on Link Analysis
    Lu Zhiyong
    Sui Sai
    Huang Chengdong
    Wang Xueyu
    [J]. 2016 INTERNATIONAL SYMPOSIUM ON COMPUTER, CONSUMER AND CONTROL (IS3C), 2016, : 511 - 514
  • [49] AN INTRUSION DETECTION SYSTEM BASED ON EVIDENCE THEORY AND ROUGH SET THEORY
    Ye Qing Wu Xiaoping Zhang Changhong (College of Electronic Engineering
    [J]. Journal of Electronics(China), 2009, 26 (06) : 777 - 781
  • [50] Malicious Java']JavaScript Code Detection Based on Hybrid Analysis
    He, Xincheng
    Xu, Lei
    Cha, Chunliu
    [J]. 2018 25TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2018), 2018, : 365 - 374