恶意软件检测技术研究

Bo Peng
{"title":"恶意软件检测技术研究","authors":"Bo Peng","doi":"10.1109/ECIT52743.2021.00091","DOIUrl":null,"url":null,"abstract":"In recent years, with the rapid development of the Internet, the Internet has become an indispensable part of society. However, with the increasing variety of malware and the application of encryption methods, the security of Internet network is constantly threatened. How to detect and identify malicious software without affecting the normal operation of user hosts and violating user privacy by monitoring a small number of non-sensitive features while software is running dynamically, so as to protect user host information, has become an imminent issue in the field of network security. In this work, a new feature extraction method is developed and proved to be effective. This paper presents a characterization method to extract malware features from three aspects: derived features, vector space features of API and context features of API. XGBoos, LGBM, Improved TextCNN models are trained to predict test sets. Finally, these models are combined with Stacking model to output the final results.","PeriodicalId":186487,"journal":{"name":"2021 2nd International Conference on E-Commerce and Internet Technology (ECIT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Research On Detection Of Malicious Software\",\"authors\":\"Bo Peng\",\"doi\":\"10.1109/ECIT52743.2021.00091\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In recent years, with the rapid development of the Internet, the Internet has become an indispensable part of society. However, with the increasing variety of malware and the application of encryption methods, the security of Internet network is constantly threatened. How to detect and identify malicious software without affecting the normal operation of user hosts and violating user privacy by monitoring a small number of non-sensitive features while software is running dynamically, so as to protect user host information, has become an imminent issue in the field of network security. In this work, a new feature extraction method is developed and proved to be effective. This paper presents a characterization method to extract malware features from three aspects: derived features, vector space features of API and context features of API. XGBoos, LGBM, Improved TextCNN models are trained to predict test sets. Finally, these models are combined with Stacking model to output the final results.\",\"PeriodicalId\":186487,\"journal\":{\"name\":\"2021 2nd International Conference on E-Commerce and Internet Technology (ECIT)\",\"volume\":\"34 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 2nd International Conference on E-Commerce and Internet Technology (ECIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ECIT52743.2021.00091\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 2nd International Conference on E-Commerce and Internet Technology (ECIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ECIT52743.2021.00091","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

近年来,随着互联网的飞速发展,互联网已经成为社会不可缺少的一部分。然而,随着恶意软件种类的增多和加密方法的应用,Internet网络的安全不断受到威胁。如何在软件动态运行时,通过对少量非敏感特征的监测,在不影响用户主机正常运行和侵犯用户隐私的情况下,检测和识别恶意软件,从而保护用户主机信息,成为网络安全领域亟待解决的问题。本文提出了一种新的特征提取方法,并证明了该方法的有效性。本文提出了一种从API的衍生特征、API的向量空间特征和API的上下文特征三个方面提取恶意软件特征的表征方法。XGBoos, LGBM,改进的TextCNN模型被训练来预测测试集。最后,将这些模型与Stacking模型相结合,输出最终结果。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Research On Detection Of Malicious Software
In recent years, with the rapid development of the Internet, the Internet has become an indispensable part of society. However, with the increasing variety of malware and the application of encryption methods, the security of Internet network is constantly threatened. How to detect and identify malicious software without affecting the normal operation of user hosts and violating user privacy by monitoring a small number of non-sensitive features while software is running dynamically, so as to protect user host information, has become an imminent issue in the field of network security. In this work, a new feature extraction method is developed and proved to be effective. This paper presents a characterization method to extract malware features from three aspects: derived features, vector space features of API and context features of API. XGBoos, LGBM, Improved TextCNN models are trained to predict test sets. Finally, these models are combined with Stacking model to output the final results.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信