A Universal Malicious Documents Static Detection Framework Based on Feature Generalization

被引:9
|
作者
Lu, Xiaofeng [1 ]
Wang, Fei [1 ]
Jiang, Cheng [1 ]
Lio, Pietro [2 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing 100876, Peoples R China
[2] Univ Cambridge, Comp Lab, Cambridge CB3 0FD, England
来源
APPLIED SCIENCES-BASEL | 2021年 / 11卷 / 24期
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
malicious document detection; static detection; feature generalization; machine learning;
D O I
10.3390/app112412134
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
In this study, Portable Document Format (PDF), Word, Excel, Rich Test format (RTF) and image documents are taken as the research objects to study a static and fast method by which to detect malicious documents. Malicious PDF and Word document features are abstracted and extended, which can be used to detect other types of documents. A universal static detection framework for malicious documents based on feature generalization is then proposed. The generalized features include specification check errors, the structure path, code keywords, and the number of objects. The proposed method is verified on two datasets, and is compared with Kaspersky, NOD32, and McAfee antivirus software. The experimental results demonstrate that the proposed method achieves good performance in terms of the detection accuracy, runtime, and scalability. The average F1-score of all types of documents is found to be 0.99, and the average detection time of a document is 0.5926 s, which is at the same level as the compared antivirus software.
引用
收藏
页数:23
相关论文
共 50 条
  • [31] Universal Generalization of Density Functional Theory for Static Correlation
    Gibney, Daniel
    Boyn, Jan-Niklas
    Mazziotti, David A.
    PHYSICAL REVIEW LETTERS, 2023, 131 (24)
  • [32] An Effective Malicious Domain Detection Framework
    Cui J.
    Shi L.
    Li J.
    Liu Z.-H.
    Yao Y.-G.
    Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology, 2019, 39 (01): : 64 - 67
  • [33] Intelligent Malicious URL Detection with Feature Analysis
    Chen, Yu-Chen
    Ma, Yi-Wei
    Chen, Jiann-Liang
    2020 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2020, : 1142 - 1146
  • [34] Application of feature selection for unknown malicious detection
    Lai, Ying-Xu
    Beijing Gongye Daxue Xuebao / Journal of Beijing University of Technology, 2009, 35 (12): : 1703 - 1709
  • [35] A Multidimensional Detection Model of Android Malicious Applications Based on Dynamic and Static Analysis
    Zhang, Hao
    Liu, Donglan
    Liu, Xin
    Ma, Lei
    Wang, Rui
    Zhang, Fangzhe
    Sun, Lili
    Zhao, Fuhui
    PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND NETWORKS, VOL III, CENET 2023, 2024, 1127 : 11 - 21
  • [36] A NEW STATIC DETECTION METHOD OF MALICIOUS DOCUMENT BASED ON WAVELET PACKAGE ANALYSIS
    Gu, Binjie
    Fang, Yong
    Jia, Peng
    Liu, Liang
    Zhang, Lei
    Wang, Meilin
    2015 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP), 2015, : 333 - 336
  • [37] A Fusion Malicious Social Bots Detection Model Based on Static and Dynamic Features
    Jiang, Hongling
    Liu, Dan
    Kang, Haiyan
    Wang, Yilin
    International Journal of Network Security, 2022, 24 (02) : 321 - 332
  • [38] A Dynamic and Static Combined Android Malicious Code Detection Model based on SVM
    Du, Jinran
    Chen, Huajun
    Zhong, Weijie
    Liu, Zhen
    Xu, Aidong
    2018 5TH INTERNATIONAL CONFERENCE ON SYSTEMS AND INFORMATICS (ICSAI), 2018, : 801 - 806
  • [39] ALDOCX: Detection of Unknown Malicious Microsoft Office Documents Using Designated Active Learning Methods Based on New Structural Feature Extraction Methodology
    Nissim, Nir
    Cohen, Aviad
    Elovici, Yuval
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (03) : 631 - 646
  • [40] A Detection Framework of Malicious Code Based on Multi-Classifiers Ensemble
    Dai, Chao
    Pang, Jianmin
    Yue, Feng
    Cui, Pingfei
    Sun, Di
    Zhu, Liang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (06): : 75 - 85