Malicious Code Forensics based on Data Mining

被引:0
|
作者
Li, Xiaohua [1 ]
Dong, Xiaomei [1 ]
Wang, Yulong [1 ]
机构
[1] Northeastern Univ, Sch Informat Sci & Engn, Shenyang, Peoples R China
来源
2013 10TH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (FSKD) | 2013年
关键词
computer forensics; malicious code; data mining; API call sequence; weighted FP-Growth algorithm;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
According to the characteristics of electronic evidence generated by malicious codes, a weighted FP-Growth frequent pattern mining algorithm was proposed for malicious code forensics. Different API call sequences were assigned different weights according to their threaten degree to obtain frequent patterns of serious malicious codes and more accurate analysis results. Based on the weighted FP-Growth algorithm, an analysis and forensics method for malicious codes was proposed. By monitoring the malicious code processes, registry, file recording and port number to record its behavior, electronic evidence of malicious codes was obtained and analyzed to generate the forensics report. Compared with the original FP-Growth algorithm, the weighted algorithm can obtain higher accuracy when used for evidence analysis. Specific examples also verified the feasibility of the method and the effect of the host.
引用
收藏
页码:978 / 983
页数:6
相关论文
共 50 条
  • [41] Malicious code detection based on heterogeneous information network
    Liu Y.
    Hou Y.
    Yan H.
    Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2022, 48 (02): : 258 - 265
  • [42] Two methods for privacy preserving data mining with malicious participants
    Shah, Divyesh
    Zhong, Sheng
    INFORMATION SCIENCES, 2007, 177 (23) : 5468 - 5483
  • [43] Efficient Privacy-Preserving Data Mining in Malicious Model
    Emura, Keita
    Miyaji, Atsuko
    Rahman, Mohammad Shahriar
    ADVANCED DATA MINING AND APPLICATIONS, ADMA 2010, PT I, 2010, 6440 : 370 - 382
  • [44] Privacy-preserving data mining on data grids in the presence of malicious participants
    Gilburd, B
    Schuster, A
    Wolff, R
    13TH IEEE INTERNATIONAL SYMPOSIUM ON HIGH PERFORMANCE DISTRIBUTED COMPUTING, PROCEEDINGS, 2004, : 225 - 234
  • [45] Lines of Malicious Code: Insights Into the Malicious Software Industry
    Lindorfer, Martina
    Di Federico, Alessandro
    Maggi, Federico
    Comparetti, Paolo Milani
    Zanero, Stefano
    28TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2012), 2012, : 349 - 358
  • [46] An Automated Malicious Host Recognition Model in Cloud Forensics
    Datta, Suchana
    Santra, Palash
    Majumder, Koushik
    De, Debashis
    NETWORKING COMMUNICATION AND DATA KNOWLEDGE ENGINEERING, VOL 2, 2018, 4 : 61 - 71
  • [47] Clustering Spam Domains and Destination Websites: Digital Forensics with Data Mining
    Wei, Chun
    Sprague, Alan
    Warner, Gary
    Skjellum, Anthony
    JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2010, 5 (01) : 21 - 48
  • [48] Development of a data-mining methodology for spent nuclear fuel forensics
    Lee, Sanghwa
    Jin, Kyungho
    Kim, Jaekwang
    Heo, Gyunyoung
    JOURNAL OF RADIOANALYTICAL AND NUCLEAR CHEMISTRY, 2017, 312 (03) : 495 - 505
  • [49] Malicious code detection in compound documents based on spectral analyses
    Liu, L. (liul@itsec.gov.cn), 1713, Tsinghua University (53):
  • [50] A Fast Malicious Code Detection Method Based on Feature Fusion
    Wang S.
    Wang J.
    Wang Y.-N.
    Song Y.-F.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2023, 51 (01): : 57 - 66