Malicious Code Forensics based on Data Mining

被引:0
|
作者
Li, Xiaohua [1 ]
Dong, Xiaomei [1 ]
Wang, Yulong [1 ]
机构
[1] Northeastern Univ, Sch Informat Sci & Engn, Shenyang, Peoples R China
来源
2013 10TH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (FSKD) | 2013年
关键词
computer forensics; malicious code; data mining; API call sequence; weighted FP-Growth algorithm;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
According to the characteristics of electronic evidence generated by malicious codes, a weighted FP-Growth frequent pattern mining algorithm was proposed for malicious code forensics. Different API call sequences were assigned different weights according to their threaten degree to obtain frequent patterns of serious malicious codes and more accurate analysis results. Based on the weighted FP-Growth algorithm, an analysis and forensics method for malicious codes was proposed. By monitoring the malicious code processes, registry, file recording and port number to record its behavior, electronic evidence of malicious codes was obtained and analyzed to generate the forensics report. Compared with the original FP-Growth algorithm, the weighted algorithm can obtain higher accuracy when used for evidence analysis. Specific examples also verified the feasibility of the method and the effect of the host.
引用
收藏
页码:978 / 983
页数:6
相关论文
共 50 条
  • [31] Malicious Code Classification Method Based on Deep Forest
    Lu X.-D.
    Duan Z.-M.
    Qian Y.-K.
    Zhou W.
    Ruan Jian Xue Bao/Journal of Software, 2020, 31 (05): : 1454 - 1464
  • [32] Live Data Mining Concerning Social Networking Forensics Based on a Facebook Session Through Aggregation of Social Data
    Chu, Hai-Cheng
    Deng, Der-Jiunn
    Park, Jong Hyuk
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2011, 29 (07) : 1368 - 1376
  • [33] A Malicious Code Immune Model Based on Program Encryption
    Chen Zemao
    Wu Xiaoping
    Tang Weimin
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 12617 - +
  • [34] Malicious code update
    Schultz, E
    COMPUTERS & SECURITY, 2004, 23 (06) : 443 - 444
  • [35] Malicious Code Detection Model Based on Behavior Association
    Lansheng Han
    Mengxiao Qian
    Xingbo Xu
    Cai Fu
    Hamza Kwisaba
    Tsinghua Science and Technology, 2014, 19 (05) : 508 - 515
  • [36] Power Based Malicious Code Detection Techniques for Smartphones
    Dixon, Bryan
    Mishra, Shivakant
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 142 - 149
  • [37] Detection of Malicious Code Variants Based on Deep Learning
    Cui, Zhihua
    Xue, Fei
    Cai, Xingjuan
    Cao, Yang
    Wang, Gai-ge
    Chen, Jinjun
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (07) : 3187 - 3196
  • [38] Identification of malicious code variants based on image visualization
    Naeem, Hamad
    Guo, Bing
    Naeem, Muhammad Rashid
    Ullah, Farhan
    Aldabbas, Hamza
    Javed, Muhammad Sufyan
    COMPUTERS & ELECTRICAL ENGINEERING, 2019, 76 : 225 - 237
  • [39] Dynamic Malicious Code Detection Based on Binary Translator
    Fang, Zhe
    Li, Minglu
    Weng, Chuliang
    Luo, Yuan
    CLOUD COMPUTING, PROCEEDINGS, 2009, 5931 : 80 - 89
  • [40] Malicious Code Detection Model Based on Behavior Association
    Han, Lansheng
    Qian, Mengxiao
    Xu, Xingbo
    Fu, Cai
    Kwisaba, Hamza
    TSINGHUA SCIENCE AND TECHNOLOGY, 2014, 19 (05) : 508 - 515