Dynamic analysis of malicious behavior propagation based on feature selection in software network

被引:0
|
作者
Xue, Huajian [1 ,2 ]
Wang, Yali [3 ]
Tang, Qiguang [4 ]
机构
[1] Tongling Univ, Coll Math & Comp Sci, Tongling, Peoples R China
[2] Tongling Univ, Anhui Engn Res Ctr Intelligent Mfg Copper based Ma, Tongling, Peoples R China
[3] Suzhou City Univ, Coll Comp Sci & Artificial Intelligence, Suzhou, Peoples R China
[4] Zhongyuan Oilfield Co SINOPEC, Zhongyuan Oilfield Oil & Gas Engn Serv Ctr, Puyang, Peoples R China
来源
FRONTIERS IN PHYSICS | 2024年 / 12卷
关键词
recurrent neural networks; information propagation; feature selection; dynamic analysis; software network;
D O I
10.3389/fphy.2024.1493209
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
In the era of big data, the propagation of malicious software poses a significant threat to corporate data security. To safeguard data assets from the encroachment of malware, it is essential to conduct a dynamic analysis of various information propagation behaviors within software. This paper introduces a dynamic analysis detection method for malicious behavior based on feature extraction (MBDFE), designed to effectively identify and thwart the spread of malicious software. The method is divided into three stages: First, variable-length N-gram algorithms are utilized to extract subsequences of varying lengths from the sample APl call sequences as continuous dynamic features. Second, feature selection techniques based on information gain are employed to identify suitable classification features. Lastly, recurrent neural networks (RNN) are applied for the classification training and prediction of diverse software behaviors. Experimental results and analysis demonstrate that this approach can accurately detect and promptly interrupt the information dissemination of malicious software when such behavior occurs, thereby enhancing the precision and timeliness of malware detection.
引用
收藏
页数:11
相关论文
共 50 条
  • [31] MADONNA: Browser-Based MAlicious Domain Detection Through Optimized Neural Network with Feature Analysis
    Senanayake, Janaka
    Rajapaksha, Sampath
    Yanai, Naoto
    Komiya, Chika
    Kalutarage, Harsha
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP SEC 2023, 2024, 679 : 279 - 292
  • [32] Unsupervised Feature Selection Algorithm for Dynamic Network Media Data Based on User Correlation
    Ren Y.-G.
    Wang Y.-L.
    Liu Y.
    Zhang J.
    Jisuanji Xuebao/Chinese Journal of Computers, 2018, 41 (07): : 1517 - 1535
  • [33] The analysis of traffic congestion and dynamic propagation properties based on complex network
    Li Shu-Bin
    Wu Jian-Jun
    Gao Zi-You
    Lin Yong
    Fu Bai-Bai
    ACTA PHYSICA SINICA, 2011, 60 (05)
  • [34] Analysis of Propagation Mechanism of Recurrent Congestion Based on Dynamic Bayesian Network
    Cheng X.
    Qu X.
    Zhang X.
    Deng Y.
    Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2022, 50 (11): : 25 - 34
  • [35] Feature Selection based on Network Maximal Correlation
    Yang, Xiaokang
    Wang, Qiang
    Wang, Yi
    2017 20TH INTERNATIONAL SYMPOSIUM ON WIRELESS PERSONAL MULTIMEDIA COMMUNICATIONS (WPMC), 2017, : 448 - 452
  • [36] Neural network ensemble based on feature selection
    Lin Jian
    Zhu Bangzhu
    2007 IEEE INTERNATIONAL CONFERENCE ON CONTROL AND AUTOMATION, VOLS 1-7, 2007, : 2432 - +
  • [37] Software Defect Prediction Using Wrapper Feature Selection Based on Dynamic Re-Ranking Strategy
    Balogun, Abdullateef Oluwagbemiga
    Basri, Shuib
    Capretz, Luiz Fernando
    Mahamad, Saipunidzam
    Imam, Abdullahi Abubakar
    Almomani, Malek A.
    Adeyemo, Victor Elijah
    Alazzawi, Ammar K.
    Bajeh, Amos Orenyi
    Kumar, Ganesh
    SYMMETRY-BASEL, 2021, 13 (11):
  • [38] A Feature Extraction Method of Hybrid Gram for Malicious Behavior Based on Machine Learning
    Zhao, Yuntao
    Bo, Bo
    Feng, Yongxin
    Xu, ChunYu
    Yu, Bo
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [39] An Effective Feature Selection Algorithm for Machine Learning-based Malicious Traffic Detection
    Fei, Chao
    Xia, Nian
    Tsai, Pang-Wei
    Lu, Yang
    Pan, Xiaonan
    Gong, Junli
    2024 19TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY, ASIAJCIS 2024, 2024, : 91 - 98
  • [40] Malware Classification Based on the Behavior Analysis and Back Propagation Neural Network
    Pan, Zhi-Peng
    Feng, Chao
    Tang, Chao-Jing
    3RD ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS (ITA 2016), 2016, 7