Run-time malware detection based on positive selection

被引:11
|
作者
Fuyong Z. [1 ]
Deyu Q. [1 ]
机构
[1] Research Institute of Computer Systems, South China University of Technology
来源
Journal in Computer Virology | 2011年 / 7卷 / 4期
基金
中国国家自然科学基金;
关键词
Selection Algorithm; Intrusion Detection; Clonal Selection; Kernel Mode; Unknown Data;
D O I
10.1007/s11416-011-0154-8
中图分类号
学科分类号
摘要
This paper presents a supervised methodology that detects malware based on positive selection. Malware detection is a challenging problem due to the rapid growth of the number of malware and increasing complexity. Run-time monitoring of program execution behavior is widely used to discriminate between benign and malicious executables due to its effectiveness and robustness. This paper proposes a novel classification algorithm based on the idea of positive selection, which is one of the important algorithms in Artificial Immune Systems (AIS), inspired by positive selection of T-cells. The proposed algorithm is applied to learn and classify program behavior based on I/O Request Packets (IRP). In our experiments, the proposed algorithm outperforms ANSC, Naï ve Bayes, Bayesian Networks, Support Vector Machine, and C4. 5 Decision Tree. This algorithm can also be used in general purpose classification problems not just two-class but multi-class problems. © 2011 Springer-Verlag France.
引用
收藏
页码:267 / 277
页数:10
相关论文
共 50 条
  • [21] Energy-efficient Run-time Detection of Malware-infected Executables and Dynamic Libraries on Mobile Devices
    Lee, Jong-seok
    Kim, Tae-Hyung
    Kim, Jong
    [J]. FIRST INTERNATIONAL WORKSHOP ON SOFTWARE TECHNOLOGIES FOR FUTURE DEPENDABLE DISTRIBUTED SYSTEMS, PROCEEDINGS, 2009, : 143 - 149
  • [22] Towards Accurate Run-Time Hardware-Assisted Stealthy Malware Detection: A Lightweight, yet Effective Time Series CNN-Based Approach
    Sayadi, Hossein
    Gao, Yifeng
    Mohammadi Makrani, Hosein
    Lin, Jessica
    Costa, Paulo Cesar
    Rafatirad, Setareh
    Homayoun, Houman
    [J]. CRYPTOGRAPHY, 2021, 5 (04)
  • [23] RUN-TIME DETECTION OF UNDEFINED VARIABLES CONSIDERED ESSENTIAL
    KEMPTON, W
    WICHMANN, BA
    [J]. SOFTWARE-PRACTICE & EXPERIENCE, 1990, 20 (04): : 391 - 402
  • [24] Run-time detection and correction of heliostat tracking errors
    Chiesi, Matteo
    Scarselli, Eleonora Franchi
    Guerrieri, Roberto
    [J]. RENEWABLE ENERGY, 2017, 105 : 702 - 711
  • [25] Run-time conflict detection in visual language parsing
    Costagliola, G.
    Deufemia, V
    Ferrucci, F.
    Gravino, C.
    [J]. JOURNAL OF COMPUTER LANGUAGES, 2020, 57
  • [26] Run-Time and Task-Based Performance of Event Detection Techniques for Twitter
    Weiler, Andreas
    Grossniklaus, Michael
    Scholl, Marc H.
    [J]. ADVANCED INFORMATION SYSTEMS ENGINEERING, CAISE 2015, 2015, 9097 : 35 - 49
  • [27] Signature-based method for run-time fault detection in communication protocols
    Noubir, G
    Vijayananda, K
    Nussbaumer, HJ
    [J]. COMPUTER COMMUNICATIONS, 1998, 21 (05) : 405 - 421
  • [28] A static analysis method for run-time errors detection
    Cao, WJ
    Xu, SH
    Shi, ZG
    [J]. ISTM/2005: 6th International Symposium on Test and Measurement, Vols 1-9, Conference Proceedings, 2005, : 6615 - 6618
  • [29] Run-time parameter selection and tuning for energy optimization algorithms
    Mauser, Ingo
    Dorscheid, Marita
    Schmeck, Hartmut
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8672 : 80 - 89
  • [30] Fake Run-Time Selection of Template Arguments in C plus
    Langr, Daniel
    Tvrdik, Pavel
    Dytrych, Tomas
    Draayer, Jerry P.
    [J]. OBJECTS, MODELS, COMPONENTS, PATTERNS, TOOLS 2012, 2012, 7304 : 140 - 154