N-gram-based detection of new malicious code

被引:0
|
作者
Abou-Assaleh, T [1 ]
Cercone, N [1 ]
Keselj, V [1 ]
Sweidan, R [1 ]
机构
[1] Dalhousie Univ, Fac Comp Sci, Privacy & Secur Lab, Halifax, NS B3H 3J5, Canada
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The current commercial anti-virus software detects a virus only after the virus has appeared and caused damage. Motivated by the standard signature-based technique for detecting viruses, and a recent successful text classification method, we explore the idea of automatically detecting new malicious code using the collected dataset of the benign and malicious code. We obtained accuracy of 100% in the training data, and 98% in 3-fold cross-validation.
引用
收藏
页码:41 / 42
页数:2
相关论文
共 50 条
  • [1] New malicious code detection based on N-gram analysis and rough set theory
    Zhang, Boyun
    Yin, Jianping
    Hao, Jingbo
    Wang, Shulin
    Zhang, Dingxing
    Tang, Wensheng
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1229 - 1232
  • [2] New malicious code detection based on N-gram analysis and rough set theory
    Zhan, Boyun
    Yin, Jianping
    Hao, Jingbo
    Wang, Shulin
    Zhang, Dingxing
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 626 - 633
  • [3] N-gram-based machine translation
    Marino, Jose B.
    Banchs, Rafael E.
    Crego, Josep M.
    de Gispert, Adria
    Lambert, Patrik
    Fonollosa, Jose A. R.
    Costa-jussa, Marta R.
    [J]. COMPUTATIONAL LINGUISTICS, 2006, 32 (04) : 527 - 549
  • [4] n-Gram-Based Text Compression
    Nguyen, Vu H.
    Nguyen, Hien T.
    Duong, Hieu N.
    Snasel, Vaclav
    [J]. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2016, 2016
  • [5] n-gram-based approach to composer recognition
    Wolkowicz, Jacek
    Kulka, Zbigniew
    Keselj, Vlado
    [J]. ARCHIVES OF ACOUSTICS, 2008, 33 (01) : 43 - 55
  • [6] Astroturfing detection in social media: a binary n-gram-based approach
    Peng, Jian
    Detchon, Sam
    Choo, Kim-Kwang Raymond
    Ashman, Helen
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (17):
  • [7] Boosting feature selection in a new non-adjacent N-gram for malicious code detection
    [J]. Parvin, Hamid (parvin@iust.ac.ir), 1600, CRL Publishing (22):
  • [8] Reordering experiments for N-gram-based SMT
    Crego, Josep M.
    Marino, Jose B.
    [J]. 2006 IEEE SPOKEN LANGUAGE TECHNOLOGY WORKSHOP, 2006, : 242 - +
  • [9] n-Gram-based indexing for Korean text retrieval
    Lee, JH
    Cho, HY
    Park, HR
    [J]. INFORMATION PROCESSING & MANAGEMENT, 1999, 35 (04) : 427 - 441
  • [10] A New N-gram Feature Extraction-Selection Method for Malicious Code
    Parvin, Hamid
    Minaei, Behrouz
    Karshenas, Hossein
    Beigi, Akram
    [J]. ADAPTIVE AND NATURAL COMPUTING ALGORITHMS, PT II, 2011, 6594 : 98 - 107