基于图像可视化技术的云计算恶意软件检测

F. Abdullayeva
{"title":"基于图像可视化技术的云计算恶意软件检测","authors":"F. Abdullayeva","doi":"10.1109/AICT47866.2019.8981727","DOIUrl":null,"url":null,"abstract":"Malware creators generate new malicious software samples by making minor changes in previously generated samples. Here, similar features of the samples from the same malware family may be used in the detection of newly generated malicious software. In this paper, a new malware detection model based on the similarity of images is proposed. Malware detection is ensured by identifying the changes made in images. For the detection of the changes in malware images, a probabilistic framework is proposed. As a result of the experiments carried out on the two images of the program code from the same class, the proposed method accurately determines the changes made to these codes. The proposed model is tested on the Malimg dataset, and the model recognizes the changes in the software code with high accuracy.","PeriodicalId":329473,"journal":{"name":"2019 IEEE 13th International Conference on Application of Information and Communication Technologies (AICT)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Malware Detection in Cloud Computing using an Image Visualization Technique\",\"authors\":\"F. Abdullayeva\",\"doi\":\"10.1109/AICT47866.2019.8981727\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Malware creators generate new malicious software samples by making minor changes in previously generated samples. Here, similar features of the samples from the same malware family may be used in the detection of newly generated malicious software. In this paper, a new malware detection model based on the similarity of images is proposed. Malware detection is ensured by identifying the changes made in images. For the detection of the changes in malware images, a probabilistic framework is proposed. As a result of the experiments carried out on the two images of the program code from the same class, the proposed method accurately determines the changes made to these codes. The proposed model is tested on the Malimg dataset, and the model recognizes the changes in the software code with high accuracy.\",\"PeriodicalId\":329473,\"journal\":{\"name\":\"2019 IEEE 13th International Conference on Application of Information and Communication Technologies (AICT)\",\"volume\":\"80 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 IEEE 13th International Conference on Application of Information and Communication Technologies (AICT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AICT47866.2019.8981727\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE 13th International Conference on Application of Information and Communication Technologies (AICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AICT47866.2019.8981727","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8

摘要

恶意软件创建者通过对先前生成的样本进行微小更改来生成新的恶意软件样本。在这里,来自同一恶意软件家族的样本的相似特征可以用于检测新生成的恶意软件。本文提出了一种基于图像相似性的恶意软件检测模型。通过识别图像中的更改来确保恶意软件检测。为了检测恶意图像的变化,提出了一个概率框架。通过对同一类程序代码的两幅图像进行实验,该方法可以准确地判断出这些代码的变化。在Malimg数据集上对该模型进行了测试,结果表明该模型对软件代码的变化具有较高的识别精度。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Malware Detection in Cloud Computing using an Image Visualization Technique
Malware creators generate new malicious software samples by making minor changes in previously generated samples. Here, similar features of the samples from the same malware family may be used in the detection of newly generated malicious software. In this paper, a new malware detection model based on the similarity of images is proposed. Malware detection is ensured by identifying the changes made in images. For the detection of the changes in malware images, a probabilistic framework is proposed. As a result of the experiments carried out on the two images of the program code from the same class, the proposed method accurately determines the changes made to these codes. The proposed model is tested on the Malimg dataset, and the model recognizes the changes in the software code with high accuracy.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信