The Algorithm of Malicious Code Detection Based on Data Mining

被引:1
|
作者
Yang, Yubo [1 ]
Zhao, Yang [1 ]
Liu, Xiabi [2 ]
机构
[1] Beijing E Hualu Informat Technol CO LTD, Beijing 100043, Peoples R China
[2] Beijing Inst Technol, Beijing 100081, Peoples R China
关键词
Malicious Code; Data Mining; Information Gain; Decision Tree;
D O I
10.1063/1.4992960
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
Traditional technology of malicious code detection has low accuracy and it has insufficient detection capability for new variants. In terms of malicious code detection technology which is based on the data mining, its indicators are not accurate enough, and its classification detection efficiency is relatively low. This paper proposed the information gain ratio indicator based on the N-gram to choose signature, this indicator can accurately reflect the detection weight of the signature, and helped by C4.5 decision tree to elevate the algorithm of classification detection.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] A Malicious Code Detection Method Based on Ensemble Learning of Behavior
    Xu X.-B.
    Zhang W.-B.
    He C.
    Luo Y.
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2019, 42 (04): : 89 - 95
  • [42] Detection Approach of Malicious JavaScript Code Based on deep learning
    Zheng, Liyuan
    Zhang, Dongcheng
    Xie, Xin
    Wang, Chen
    Hou, Boyuan
    Proceedings of 2023 IEEE 3rd International Conference on Information Technology, Big Data and Artificial Intelligence, ICIBA 2023, 2023, : 1075 - 1079
  • [43] A method for efficient malicious code detection based on conceptual similarity
    Kim, Sungsuk
    Choi, Chang
    Choi, Junho
    Kim, Pankoo
    Kim, Hanil
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 4, 2006, 3983 : 567 - 576
  • [44] Android malicious code detection and recognition based on depth learning
    Jing, Yang
    PROCEEDINGS OF THE 2017 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTER (MACMC 2017), 2017, 150 : 179 - 183
  • [45] Malicious Java']JavaScript Code Detection Based on Hybrid Analysis
    He, Xincheng
    Xu, Lei
    Cha, Chunliu
    2018 25TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2018), 2018, : 365 - 374
  • [46] A malicious code detection method based on integrated behavior characterization
    Liu, Wei-Wei
    Shi, Yong
    Guo, Yu
    Han, Zhen
    Shen, Chang-Xiang
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2009, 37 (04): : 696 - 700
  • [47] N-gram-based detection of new malicious code
    Abou-Assaleh, T
    Cercone, N
    Keselj, V
    Sweidan, R
    PROCEEDINGS OF THE 28TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATION CONFERENCE, WORKSHOP AND FAST ABSTRACTS, 2004, : 41 - 42
  • [48] Detection of Malicious Requests on Web Logs Using Data Mining Techniques
    Sahin, Mehmet Emin
    Ozdemir, Suat
    2019 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2019, : 463 - 468
  • [49] Detection of malicious code in user mode
    Sangeetha, R.
    2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2013, : 146 - 149
  • [50] A Mobile Malware Detection Method Based on Malicious Subgraphs Mining
    Du, Yao
    Cui, Mengtian
    Cheng, Xiaochun
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021 (2021)