Malicious Code Forensics based on Data Mining

被引:0
|
作者
Li, Xiaohua [1 ]
Dong, Xiaomei [1 ]
Wang, Yulong [1 ]
机构
[1] Northeastern Univ, Sch Informat Sci & Engn, Shenyang, Peoples R China
来源
2013 10TH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (FSKD) | 2013年
关键词
computer forensics; malicious code; data mining; API call sequence; weighted FP-Growth algorithm;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
According to the characteristics of electronic evidence generated by malicious codes, a weighted FP-Growth frequent pattern mining algorithm was proposed for malicious code forensics. Different API call sequences were assigned different weights according to their threaten degree to obtain frequent patterns of serious malicious codes and more accurate analysis results. Based on the weighted FP-Growth algorithm, an analysis and forensics method for malicious codes was proposed. By monitoring the malicious code processes, registry, file recording and port number to record its behavior, electronic evidence of malicious codes was obtained and analyzed to generate the forensics report. Compared with the original FP-Growth algorithm, the weighted algorithm can obtain higher accuracy when used for evidence analysis. Specific examples also verified the feasibility of the method and the effect of the host.
引用
收藏
页码:978 / 983
页数:6
相关论文
共 50 条
  • [21] Unknown Malicious Code Detection Based on Bayesian
    Lai, Yingxu
    Liu, Zhenghui
    CEIS 2011, 2011, 15
  • [22] Mining malicious corruption of data with Hidden Markov models
    Barbará, D
    Goel, R
    Jajodia, S
    RESEARCH DIRECTIONS IN DATA AND APPLICATIONS SECURITY, 2003, 128 : 175 - 189
  • [23] Data mining methods for detection of new malicious executables
    Schultz, MG
    Eskin, E
    Zadok, E
    Stolfo, SJ
    2001 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2001, : 38 - 49
  • [24] Privacy-preserving data mining in the malicious model
    Kantarcioglu, Murat
    Kardes, Onur
    International Journal of Information and Computer Security, 2008, 2 (04) : 353 - 375
  • [25] DataRinse: Semantic Transforms for Data preparation based on Code Mining
    Abdelaziz, Ibrahim
    Dolby, Julian
    Khurana, Udayan
    Samulowitz, Horst
    Srinivas, Kavitha
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2023, 16 (12): : 4090 - 4093
  • [26] Design of malicious code detection system based on binar code slicin
    Zhang, Zhiyuan
    Zhang, Zhenjiang
    Li, Wei
    Zhou, Hongde
    Shen, Bo
    Journal of Computers (Taiwan), 2021, 32 (04) : 225 - 238
  • [27] Predicting Malicious Software in IoT Environment Based on Machine Learning and Data Mining Techniques
    Alharbi, Abdulmohsen
    Hamid, Abdul
    Lahza, Husam
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (08) : 497 - 506
  • [28] Detecting Faulty and Malicious Vehicles Using Rule-based Communications Data Mining
    Rezgui, Jihene
    Cherkaoui, Soumaya
    2011 IEEE 36TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2011, : 827 - 834
  • [29] Risk Prediction of Malicious Code-Infected Websites by Mining Vulnerability Features
    Lee, Taek
    Kim, Dohoon
    Jeong, Hyunchoel
    In, Hoh Peter
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (01): : 291 - 294
  • [30] Immunity-Based Model for Malicious Code Detection
    Zhang, Yu
    Wu, Lihua
    Xia, Feng
    Liu, Xiaowen
    ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS, 2010, 6215 : 399 - 406