• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

数字取证在恶意软件分类中的应用:一种从二进制代码到像素向量转换的方法。

Digital Forensics for Malware Classification: An Approach for Binary Code to Pixel Vector Transition.

机构信息

Department of Computer Science, University of Engineering and Technology Taxila, Taxila, Pakistan.

Department of Information Technology College of Computer and Information Technology, Taif University, P.O. Box 11099, Taif 21944, Saudi Arabia.

出版信息

Comput Intell Neurosci. 2022 Apr 21;2022:6294058. doi: 10.1155/2022/6294058. eCollection 2022.

DOI:10.1155/2022/6294058
PMID:35498213
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9050294/
Abstract

The most often reported danger to computer security is malware. Antivirus company AV-Test Institute reports that more than 5 million malware samples are created each day. A malware classification method is frequently required to prioritize these occurrences because security teams cannot address all of that malware at once. Malware's variety, volume, and sophistication are all growing at an alarming rate. Hackers and attackers routinely design systems that can automatically rearrange and encrypt their code to escape discovery. Traditional machine learning approaches, in which classifiers learn based on a hand-crafted feature vector, are ineffective for classifying malware. Recently, deep convolutional neural networks (CNNs) successfully identified and classified malware. To categorize malware, a smart system has been suggested in this research. A novel model of deep learning is introduced to categorize malware families and multiclassification. The malware file is converted to a grayscale picture, and the image is then classified using a convolutional neural network. To evaluate the performance of our technique, we used a Microsoft malware dataset of 10,000 samples with nine distinct classifications. The findings stood out among the deep learning models with 99.97% accuracy for nine malware types.

摘要

计算机安全最常报告的危险是恶意软件。反病毒公司 AV-Test Institute 报告称,每天创建的恶意软件样本超过 500 万。由于安全团队不可能一次性解决所有这些恶意软件,因此经常需要一种恶意软件分类方法来对这些事件进行优先级排序。恶意软件的种类、数量和复杂性都在以惊人的速度增长。黑客和攻击者经常设计可以自动重新排列和加密其代码以逃避发现的系统。传统的机器学习方法,其中分类器基于手工制作的特征向量进行学习,对于恶意软件分类效果不佳。最近,深度卷积神经网络(CNN)成功地识别和分类了恶意软件。为了对恶意软件进行分类,本研究提出了一个智能系统。引入了一种新的深度学习模型,用于对恶意软件家族和多分类进行分类。将恶意软件文件转换为灰度图像,然后使用卷积神经网络对图像进行分类。为了评估我们的技术的性能,我们使用了一个包含 10000 个样本和 9 个不同分类的 Microsoft 恶意软件数据集。我们的技术在 9 种恶意软件类型上的准确率达到了 99.97%,在深度学习模型中表现突出。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/821b/9050294/516b80422af3/CIN2022-6294058.011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/821b/9050294/c493115ec2b8/CIN2022-6294058.001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/821b/9050294/a984b815e110/CIN2022-6294058.002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/821b/9050294/c78891103f2a/CIN2022-6294058.003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/821b/9050294/b0e975240986/CIN2022-6294058.004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/821b/9050294/8cb5a2e3c405/CIN2022-6294058.005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/821b/9050294/60a447f70697/CIN2022-6294058.006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/821b/9050294/53b23a436b70/CIN2022-6294058.007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/821b/9050294/e81d051e34fc/CIN2022-6294058.008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/821b/9050294/416b7ac638e5/CIN2022-6294058.009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/821b/9050294/10871b824a56/CIN2022-6294058.010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/821b/9050294/516b80422af3/CIN2022-6294058.011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/821b/9050294/c493115ec2b8/CIN2022-6294058.001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/821b/9050294/a984b815e110/CIN2022-6294058.002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/821b/9050294/c78891103f2a/CIN2022-6294058.003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/821b/9050294/b0e975240986/CIN2022-6294058.004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/821b/9050294/8cb5a2e3c405/CIN2022-6294058.005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/821b/9050294/60a447f70697/CIN2022-6294058.006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/821b/9050294/53b23a436b70/CIN2022-6294058.007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/821b/9050294/e81d051e34fc/CIN2022-6294058.008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/821b/9050294/416b7ac638e5/CIN2022-6294058.009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/821b/9050294/10871b824a56/CIN2022-6294058.010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/821b/9050294/516b80422af3/CIN2022-6294058.011.jpg

相似文献

1
Digital Forensics for Malware Classification: An Approach for Binary Code to Pixel Vector Transition.数字取证在恶意软件分类中的应用:一种从二进制代码到像素向量转换的方法。
Comput Intell Neurosci. 2022 Apr 21;2022:6294058. doi: 10.1155/2022/6294058. eCollection 2022.
2
Malicious Code Variant Identification Based on Multiscale Feature Fusion CNNs.基于多尺度特征融合卷积神经网络的恶意代码变体识别。
Comput Intell Neurosci. 2021 Dec 14;2021:1070586. doi: 10.1155/2021/1070586. eCollection 2021.
3
A Modified ResNeXt for Android Malware Identification and Classification.一种用于 Android 恶意软件识别和分类的改进型 ResNeXt。
Comput Intell Neurosci. 2022 May 20;2022:8634784. doi: 10.1155/2022/8634784. eCollection 2022.
4
Deep feature transfer learning for trusted and automated malware signature generation in private cloud environments.深度特征迁移学习在私有云环境中用于可信和自动化的恶意软件特征生成。
Neural Netw. 2020 Apr;124:243-257. doi: 10.1016/j.neunet.2020.01.003. Epub 2020 Jan 27.
5
Explainable Artificial Intelligence-Based IoT Device Malware Detection Mechanism Using Image Visualization and Fine-Tuned CNN-Based Transfer Learning Model.基于可解释人工智能的物联网设备恶意软件检测机制,使用图像可视化和微调的基于卷积神经网络的迁移学习模型。
Comput Intell Neurosci. 2022 Jul 15;2022:7671967. doi: 10.1155/2022/7671967. eCollection 2022.
6
Homology analysis of malware based on ensemble learning and multifeatures.基于集成学习和多特征的恶意软件同源分析。
PLoS One. 2019 Aug 26;14(8):e0211373. doi: 10.1371/journal.pone.0211373. eCollection 2019.
7
A Novel Detection and Multi-Classification Approach for IoT-Malware Using Random Forest Voting of Fine-Tuning Convolutional Neural Networks.基于卷积神经网络微调随机森林投票的物联网恶意软件新型检测与多分类方法。
Sensors (Basel). 2022 Jun 6;22(11):4302. doi: 10.3390/s22114302.
8
Convolution neural network with batch normalization and inception-residual modules for Android malware classification.基于批量归一化和 Inception-Residual 模块的卷积神经网络用于安卓恶意软件分类。
Sci Rep. 2022 Aug 17;12(1):13996. doi: 10.1038/s41598-022-18402-6.
9
Sparse attention with residual pyramidal depthwise separable convolutional based malware detection with optimization mechanism.基于带有优化机制的残差金字塔深度可分离卷积的稀疏注意力恶意软件检测
Sci Rep. 2024 Oct 18;14(1):24414. doi: 10.1038/s41598-024-76193-4.
10
Data augmentation based malware detection using convolutional neural networks.基于数据增强的卷积神经网络恶意软件检测
PeerJ Comput Sci. 2021 Jan 22;7:e346. doi: 10.7717/peerj-cs.346. eCollection 2021.

引用本文的文献

1
Harnessing AI and analytics to enhance cybersecurity and privacy for collective intelligence systems.利用人工智能和分析技术提升集体智能系统的网络安全和隐私保护。
PeerJ Comput Sci. 2024 Sep 20;10:e2264. doi: 10.7717/peerj-cs.2264. eCollection 2024.
2
A Semi-Self-Supervised Intrusion Detection System for Multilevel Industrial Cyber Protection.一种用于多层次工业网络防护的半监督式入侵检测系统。
Comput Intell Neurosci. 2022 Sep 21;2022:4043309. doi: 10.1155/2022/4043309. eCollection 2022.

本文引用的文献

1
Malware analysis using visualized image matrices.使用可视化图像矩阵进行恶意软件分析。
ScientificWorldJournal. 2014;2014:132713. doi: 10.1155/2014/132713. Epub 2014 Jul 16.