Dynamic analysis of malicious behavior propagation based on feature selection in software network

被引:0
|
作者
Xue, Huajian [1 ,2 ]
Wang, Yali [3 ]
Tang, Qiguang [4 ]
机构
[1] Tongling Univ, Coll Math & Comp Sci, Tongling, Peoples R China
[2] Tongling Univ, Anhui Engn Res Ctr Intelligent Mfg Copper based Ma, Tongling, Peoples R China
[3] Suzhou City Univ, Coll Comp Sci & Artificial Intelligence, Suzhou, Peoples R China
[4] Zhongyuan Oilfield Co SINOPEC, Zhongyuan Oilfield Oil & Gas Engn Serv Ctr, Puyang, Peoples R China
来源
FRONTIERS IN PHYSICS | 2024年 / 12卷
关键词
recurrent neural networks; information propagation; feature selection; dynamic analysis; software network;
D O I
10.3389/fphy.2024.1493209
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
In the era of big data, the propagation of malicious software poses a significant threat to corporate data security. To safeguard data assets from the encroachment of malware, it is essential to conduct a dynamic analysis of various information propagation behaviors within software. This paper introduces a dynamic analysis detection method for malicious behavior based on feature extraction (MBDFE), designed to effectively identify and thwart the spread of malicious software. The method is divided into three stages: First, variable-length N-gram algorithms are utilized to extract subsequences of varying lengths from the sample APl call sequences as continuous dynamic features. Second, feature selection techniques based on information gain are employed to identify suitable classification features. Lastly, recurrent neural networks (RNN) are applied for the classification training and prediction of diverse software behaviors. Experimental results and analysis demonstrate that this approach can accurately detect and promptly interrupt the information dissemination of malicious software when such behavior occurs, thereby enhancing the precision and timeliness of malware detection.
引用
收藏
页数:11
相关论文
共 50 条
  • [21] Software defect prediction using wrapper-based dynamic arithmetic optimization for feature selection
    Anand, Kunal
    Jena, Ajay Kumar
    Das, Himansu
    Askar, S. S.
    Abouhawwash, Mohamed
    CONNECTION SCIENCE, 2025, 37 (01)
  • [22] A NEW NETWORK BASED FEATURE-SELECTION APPROACH FOR HYPERSPCETRAL ANALYSIS
    Xia, Wei
    Pu, Hanye
    Dong, Zhao
    Wang, Bin
    Zhang, Liming
    2012 4TH WORKSHOP ON HYPERSPECTRAL IMAGE AND SIGNAL PROCESSING (WHISPERS), 2012,
  • [23] BP Neural Network Feature Selection Method Based on Sensitivity Analysis
    Dun, Yuqing
    Chen, Li
    Liu, Jing
    Chen, Qiang
    ADVANCING KNOWLEDGE DISCOVERY AND DATA MINING TECHNOLOGIES, PROCEEDINGS, 2009, : 451 - 455
  • [24] Selection of Network Feature Attribute Based On Classification Discrimination And Correlation Analysis
    Liu, Yang
    Ma, Hongwei
    Li, Kuangdai
    Yi, Hang
    Yan, Xiaotao
    Kang, Jian
    COMPANION OF THE 2020 IEEE 20TH INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY, AND SECURITY (QRS-C 2020), 2020, : 328 - 333
  • [25] Quantitative Model for Dynamic Propagation and Countermeasure of Malicious Cyber Attack on the Mobile Wireless Network
    Falaye, Adeyinka A.
    Oluyemi, Etuk Stella
    Ale, Seun
    Abdullahi, Muhammad Bashir
    Uchenna, Ugwuoke Cosmas
    Awogbemi, Femi
    PROCEEDINGS OF THE 2017 INTELLIGENT SYSTEMS CONFERENCE (INTELLISYS), 2017, : 1095 - 1102
  • [26] Feature Selection Framework for Optimizing ML-based Malicious URL Detection
    Shah, Sajjad H.
    Garu, Amit
    Nguyen, Duong N.
    Borowczak, Mike
    2024 CYBER AWARENESS AND RESEARCH SYMPOSIUM, CARS 2024, 2024,
  • [27] A New Automatic Detection System Design of Malicious Behavior Based on Software Behavior Sequence
    Jiang, Chong
    Qu, Qifu
    2020 10TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY (ICIST), 2020, : 58 - 64
  • [28] BAGUETTE: Hunting for Evidence of Malicious Behavior in Dynamic Analysis Reports
    Raulin, Vincent
    Gimenez, Pierre-Francois
    Han, Yufei
    Tong, Valerie Viet Triem
    PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 417 - 424
  • [29] Software Defect Prediction Scheme Based on Feature Selection
    Wang, Pei
    Jin, Cong
    Jin, Shu-Wei
    2012 INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING (ISISE), 2012, : 477 - 480
  • [30] A Feature Selection Method Based On Software Defined Networks
    Undar, Desdina Kof
    Pehlivanli, Zeynep Gul
    Arsal, Ali
    2022 30TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE, SIU, 2022,