期刊文献+

基于关联规则的未知恶意程序检测技术 被引量:3

New Malicious Executables Detection Based on Association Rules
下载PDF
导出
摘要 针对当前基于特征码病毒检测技术不能检测出未知病毒的缺点,通过研究某些病毒及其变种版本在执行过程中应用程序接口(API)调用序列的规律,提出一种基于数据挖掘的检测技术,采用Apriori算法从已知病毒的API调用序列中提取有价值的关联规则,用于指导病毒检测。实验结果表明该方法对未知病毒检测有良好的效果。 In order to improve the current malicious detection technology based on signature, this paper presents a method based on data mining. By researching the rules of API calling sequences during executing viruses, the method uses Apriori algorithms to extract some valuable related rules which hide out in a lot of API calling sequences of viruses. These rules can be used to detect Viruses. Experimental results validate its effection.
出处 《计算机工程》 CAS CSCD 北大核心 2008年第24期172-174,共3页 Computer Engineering
基金 国家"863"计划基金资助项目(2006AA01Z449)
关键词 关联规则 未知恶意程序 应用程序接口 association rules new malicious executables API
  • 相关文献

参考文献7

  • 1Xu Jianyun, Sung A H, Chavez E Polymorphic Malicious Executable Scanner by API Sequence Analysis[C]//Proc. of the 4th Int'l Conference on Hybrid Intelligent Systems. Washington, USA: [s. n.], 2004. 被引量:1
  • 2孙即祥.现代模式识别[M].长沙:国防科技大学出版社,2001. 被引量:25
  • 3Kamber M, Han Jiawei, Chiang Jenny. Metarule-guided Mining of Multi-dimensional Association Rules Using Data Cubes[C]//Proc. of the 3rd Int'l Conf. on Knowledge Discovery and Data Mining. California, USA: [s. n.], 1997: 207-210. 被引量:1
  • 4Agrawal R. Mining Association Rules Between Sets of Items in Large Database[C]//Proc. of the ACM SIGMOD Conference on Management of Data. Washington, USA: ACM Press, 1993. 被引量:1
  • 5朱秋萍,毛平平,罗俊.基于关联规则的入侵检测系统[J].计算机工程与应用,2004,40(26):160-162. 被引量:7
  • 6Sung A H, Xu Jianyun, Chavez E Analyzer for Vicious Executables[C]//Proc. of the 20th Annual Computer Security Applications Conference. Washington, USA: [s. n.], 2004: 326-340. 被引量:1
  • 7Christodorescu M, Jha S, Seshia S A, et al. Semantics Aware Malware Detection[C]//Proceedings of the 2005 IEEE Symposium on Security and Privacy. OakLand, USA: IEEE Press, 2005. 被引量:1

二级参考文献5

  • 1R Agrawal,T Imielinski,A Swami. Mining Association Rules Between Sets of Items in Large Databases[C].In:Proceedings of the ACM SIGMOD Conference on Management of data,Downloaded from http://www.cs.brandeis.edu/~cs227b/papers/decision-dataminingoverviewsigmod93.pdf, 1993: 207 ~216 被引量:1
  • 2R Agrawal. Ramakrishnan Srikant. Fast Algorithms for Mining Association Rules. IBM Almaden Research Center, 1996 被引量:1
  • 3S Brin,R Motwani,C Silverstein. Beyond market baskets:generlizing association rules to correlations[C].In:Proceedings of the ACM SIGMOD, 1996: 255~276 被引量:1
  • 4Buchanan B G,Mitchell T.Model-directed Learning of Production Rules. Waterman D A,Hayes-Roth F eds.Pattern Directed Inference Systems,Academic Press, 1978:297~312 被引量:1
  • 5李维民,彭新光,王全民.一种基于匹配集的入侵检测方法[J].太原理工大学学报,2001,32(6):608-611. 被引量:1

共引文献30

同被引文献27

  • 1M.Christodorescu. Testing Maiware Detectors. In Proceedings of the ACM SIGSOFT International Symposium on Software Testing and Analysis 2004, Boston, MA, USA, July 2004, ACM SIGSOFT, ACM Press:S4-44. 被引量:1
  • 2Bacher P, Holz T, Kotter M, Wicherski G. "Know your enemy: Tracking botnets" . 被引量:1
  • 3Matthew G.Schultz, Eleazar Eskin, Erez Zadok. Data Mining Methods for Detection of New Malicious Executables. IEEE Computer Society, 2001:38-49. 被引量:1
  • 4Mihai Christodorescu. Static analysis of executables to detect malicious patterns. Proceedings of the 12th conference on USENIX Security Symposium, 2003,50(6): 169-186. 被引量:1
  • 5Tony Abou--Assaleh, Cercone N, Sweidan R. Detection of new malicious code using n-grams signatures. Second annual conference on privacy, security and trust. 2004, p: 193-196. 被引量:1
  • 6Moser A, Kruegel C, Kirda E. Limits of static analysis for malware detection. Proceedings of Twenty-Third Annual Computer Security Applications Conference, 2007, 421-430. 被引量:1
  • 7张永超,基于虚拟执行技术的恶意程序检测系统研究与实现. 被引量:1
  • 8王卫东,僵木蠕检测平台的实现思路. 被引量:1
  • 9P.Ferrie. Attacks on Virtual Machine Emulators. In: AVAR Conference in AVAR Conference. Auckland, Symantec Advanced Threat Research, 2006. 被引量:1
  • 10Rich Uhlig, Gil Neiger, Dion R, odger54s etc. Intel Virtualization Technology. IEEE Computer, 38(5):48-56. 被引量:1

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部