期刊文献+

改进指纹和LSC加权的恶意程序代码相似度估计算法 被引量:1

Improve Fingerprint and LSC Weighted Malicious Program Code Similarity Estimation Algorithm
下载PDF
导出
摘要 恶意程序代码的相似度估计是恶意程序代码分析和检测的重要研究内容。现有的方法主要是对恶意程序代码进行属性计算或结构度量,但由于恶意程序代码结构的灵活性和恶意程序代码的伪装、恶意程序代码的相似度较难度量。提出了改进指纹和LSC加权的恶意程序代码相似度估计算法。该算法首先对恶意程序代码进行函数作用域划分和标准化预处理,然后对其进行字串序列化,利用改进的指纹相似度来对恶意程序代码的相似度进行度量;同时结合最大公共字串匹配算法进行结构度量,并对其相似度计算结果进行加权,对恶意程序代码结构的相似度进行综合估计。实验以C语言结构的程序代码为例,利用折半查找算法生成恶意程序代码测试数据集进行算法有效性验证。仿真证明该算法具有较好的恶意程序代码相似度估算精度。 The malicious program code similarity estimation is malicious code analysis and detection is an important research content. The existing method is mainly to the malicious code for attribute computing or structure measure, but as a result of malicious code structure flexibility and malicious code disguise, malicious program code similarity is difficulty quantity. Improvement fingerprints and LSC weighted malicious program code similarity esti- mation algorithm are put forward, in this algorithm first for malicious program code function scope division and standardization preprocessing, and then carry on the string serialization, using the improved fingerprint similarity to malicious program code similarity measure for, in combination with the biggest public word string matching algo- rithm structure measure, and the similarity calculation results are weighted, the malicious program code similarity structure comprehensive estimation. Experiments to C language structure of the program code, for example, the use of binary search algorithm generating malicious code test data sets algorithm validation, the simulation results show that the algorithm has good malicious program code similarity estimation accuracy.
出处 《科学技术与工程》 北大核心 2013年第10期2871-2874,2879,共5页 Science Technology and Engineering
基金 国家自然科学基金项目(61142010)资助
关键词 恶意程序代码 相似度估计 LSC算法 串匹配 malicious code similarity estimation LSC algorithms string matching
  • 相关文献

参考文献14

二级参考文献35

  • 1程金宏,刘东升.程序代码相似度自动度量技术研究综述[J].内蒙古师范大学学报(自然科学汉文版),2006,35(4):457-461. 被引量:13
  • 2Edward J L. Metrics-based Plagiarism Monitoring[J]. Journal of Computing Sciences in Colleges, 2001, 16(4): 253-261. 被引量:1
  • 3Gitchell D, Sim N T. A Utility for Detecting Similarity in Computer Programs[C]//Proc. of the ACM SIGCSE'99. New Orleans, LA, USA: [s. n.], 1999. 被引量:1
  • 4Halstead M. Elements of Software Science[M]. New York, USA Elsevier North Holland Press, 1977. 被引量:1
  • 5Eppstein D. Design and Analysis of Algorithms Lecture Notes[Z] (2006-02-09). http://www.ics.uci.edu/-eppstein/161/960229.html. 被引量:1
  • 6Ahmed K E,Panagiotis G I,Vassilios S V.Duplicate record detection:a survey[J].IEEE Transactions on Knowledge and Data Engieering,2007,19(1):1-15. 被引量:1
  • 7William E W.Overview of record linkage and current research directions[R].US Bureau of the Census,Stafistical Research Report Series RRS2006/02,2006. 被引量:1
  • 8William E W,Pradeep R,Stephen E.A comparison of string distance metrics for name-matching tasks[C].Acapulco,Mexico:Proceeding LICAI,2003:73-78. 被引量:1
  • 9Nick kSunita S,Divesh S.Record linkage:similarity measures and algorithms[C].Chicago,USA:Proceedings of the ACM SIGMOD International Conference on Management of Data.ACM Press,2006. 被引量:1
  • 10Cohen W,Ravikumar P,Feinberg S.A comparison of string mettics for matching names and records[C].New York:proceedings of KDD Workshop on Data Cleaning and Object Consolidation.ACM Press,2003:103-108. 被引量:1

共引文献42

同被引文献2

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部