The Algorithm of Malicious Code Detection Based on Data Mining

被引:1
|
作者
Yang, Yubo [1 ]
Zhao, Yang [1 ]
Liu, Xiabi [2 ]
机构
[1] Beijing E Hualu Informat Technol CO LTD, Beijing 100043, Peoples R China
[2] Beijing Inst Technol, Beijing 100081, Peoples R China
来源
GREEN ENERGY AND SUSTAINABLE DEVELOPMENT I | 2017年 / 1864卷
关键词
Malicious Code; Data Mining; Information Gain; Decision Tree;
D O I
10.1063/1.4992960
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
Traditional technology of malicious code detection has low accuracy and it has insufficient detection capability for new variants. In terms of malicious code detection technology which is based on the data mining, its indicators are not accurate enough, and its classification detection efficiency is relatively low. This paper proposed the information gain ratio indicator based on the N-gram to choose signature, this indicator can accurately reflect the detection weight of the signature, and helped by C4.5 decision tree to elevate the algorithm of classification detection.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] A Fast Malicious Code Detection Method Based on Feature Fusion
    Wang S.
    Wang J.
    Wang Y.-N.
    Song Y.-F.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2023, 51 (01): : 57 - 66
  • [32] Malicious code clone detection technology based on deep learning
    Shen Y.
    Yan H.
    Xia C.
    Han Z.
    Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2022, 48 (02): : 282 - 290
  • [33] An Expressway Congestion Detection Algorithm Based on ETC Data Mining
    Yu, Xiang
    Zou, FuMin
    Guo, Feng
    Gu, Qing
    Chen, ZiYu
    Luo, YongYu
    Chen, HaoBin
    ADVANCES IN INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2021 & FITAT 2021), VOL 1, 2022, 277 : 269 - 279
  • [34] Hybrid Face Detection Algorithm Based on a Data Mining Approach
    Fattahi, E.
    Broumandnia, A.
    2012 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2012, : 229 - 234
  • [35] A kind of Malicious Code Detection Scheme based on Fuzzy Reasoning
    Gang, Guo
    Chen Zhongquan
    2014 7TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION (ICICTA), 2014, : 19 - 22
  • [36] A Hybrid Malicious Code Detection Method based on Deep Learning
    Li, Yuancheng
    Ma, Rong
    Jiao, Runhai
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (05): : 205 - 215
  • [37] Design of Intrusion Detection System Based on Data Mining Algorithm
    Song, Changxin
    Ma, Ke
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING SYSTEMS, 2009, : 370 - 373
  • [38] Detection Method of WEB Malicious Code based on Link Analysis
    Lu Zhiyong
    Sui Sai
    Huang Chengdong
    Wang Xueyu
    2016 INTERNATIONAL SYMPOSIUM ON COMPUTER, CONSUMER AND CONTROL (IS3C), 2016, : 511 - 514
  • [39] Research on malicious code variants detection based on texture fingerprint
    Han, Xiao-Guang
    Qu, Wu
    Yao, Xuan-Xia
    Guo, Chang-You
    Zhou, Fang
    Han, Xiao-Guang, 1600, Editorial Board of Journal on Communications (35): : 125 - 136
  • [40] Algorithm of Intrusion Detection Based on Data Mining and Its Implementation
    孙海彬
    徐良贤
    陈彦华
    Journal of DongHua University, 2004, (05) : 88 - 92