{"title":"恶意软件检测技术研究","authors":"Bo Peng","doi":"10.1109/ECIT52743.2021.00091","DOIUrl":null,"url":null,"abstract":"In recent years, with the rapid development of the Internet, the Internet has become an indispensable part of society. However, with the increasing variety of malware and the application of encryption methods, the security of Internet network is constantly threatened. How to detect and identify malicious software without affecting the normal operation of user hosts and violating user privacy by monitoring a small number of non-sensitive features while software is running dynamically, so as to protect user host information, has become an imminent issue in the field of network security. In this work, a new feature extraction method is developed and proved to be effective. This paper presents a characterization method to extract malware features from three aspects: derived features, vector space features of API and context features of API. XGBoos, LGBM, Improved TextCNN models are trained to predict test sets. Finally, these models are combined with Stacking model to output the final results.","PeriodicalId":186487,"journal":{"name":"2021 2nd International Conference on E-Commerce and Internet Technology (ECIT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Research On Detection Of Malicious Software\",\"authors\":\"Bo Peng\",\"doi\":\"10.1109/ECIT52743.2021.00091\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In recent years, with the rapid development of the Internet, the Internet has become an indispensable part of society. However, with the increasing variety of malware and the application of encryption methods, the security of Internet network is constantly threatened. How to detect and identify malicious software without affecting the normal operation of user hosts and violating user privacy by monitoring a small number of non-sensitive features while software is running dynamically, so as to protect user host information, has become an imminent issue in the field of network security. In this work, a new feature extraction method is developed and proved to be effective. This paper presents a characterization method to extract malware features from three aspects: derived features, vector space features of API and context features of API. XGBoos, LGBM, Improved TextCNN models are trained to predict test sets. Finally, these models are combined with Stacking model to output the final results.\",\"PeriodicalId\":186487,\"journal\":{\"name\":\"2021 2nd International Conference on E-Commerce and Internet Technology (ECIT)\",\"volume\":\"34 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 2nd International Conference on E-Commerce and Internet Technology (ECIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ECIT52743.2021.00091\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 2nd International Conference on E-Commerce and Internet Technology (ECIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ECIT52743.2021.00091","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In recent years, with the rapid development of the Internet, the Internet has become an indispensable part of society. However, with the increasing variety of malware and the application of encryption methods, the security of Internet network is constantly threatened. How to detect and identify malicious software without affecting the normal operation of user hosts and violating user privacy by monitoring a small number of non-sensitive features while software is running dynamically, so as to protect user host information, has become an imminent issue in the field of network security. In this work, a new feature extraction method is developed and proved to be effective. This paper presents a characterization method to extract malware features from three aspects: derived features, vector space features of API and context features of API. XGBoos, LGBM, Improved TextCNN models are trained to predict test sets. Finally, these models are combined with Stacking model to output the final results.