• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

一种基于库尔贝克-莱布勒散度的恶意软件检测表示算法。

A Kullback-Liebler divergence-based representation algorithm for malware detection.

作者信息

Aboaoja Faitouri A, Zainal Anazida, Ghaleb Fuad A, Alghamdi Norah Saleh, Saeed Faisal, Alhuwayji Husayn

机构信息

Faculty of Computing, Universiti Teknologi Malaysia, Johor Baru, Johor, Malaysia.

Faculty of Education-Elgobbah, University of Derna, Libya, Elgobbah, Barka, Libya.

出版信息

PeerJ Comput Sci. 2023 Sep 22;9:e1492. doi: 10.7717/peerj-cs.1492. eCollection 2023.

DOI:10.7717/peerj-cs.1492
PMID:37810364
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC10557483/
Abstract

BACKGROUND

Malware, malicious software, is the major security concern of the digital realm. Conventional cyber-security solutions are challenged by sophisticated malicious behaviors. Currently, an overlap between malicious and legitimate behaviors causes more difficulties in characterizing those behaviors as malicious or legitimate activities. For instance, evasive malware often mimics legitimate behaviors, and evasion techniques are utilized by legitimate and malicious software.

PROBLEM

Most of the existing solutions use the traditional term of frequency-inverse document frequency (TF-IDF) technique or its concept to represent malware behaviors. However, the traditional TF-IDF and the developed techniques represent the features, especially the shared ones, inaccurately because those techniques calculate a weight for each feature without considering its distribution in each class; instead, the generated weight is generated based on the distribution of the feature among all the documents. Such presumption can reduce the meaning of those features, and when those features are used to classify malware, they lead to a high false alarms.

METHOD

This study proposes a Kullback-Liebler Divergence-based Term Frequency-Probability Class Distribution (KLD-based TF-PCD) algorithm to represent the extracted features based on the differences between the probability distributions of the terms in malware and benign classes. Unlike the existing solution, the proposed algorithm increases the weights of the important features by using the Kullback-Liebler Divergence tool to measure the differences between their probability distributions in malware and benign classes.

RESULTS

The experimental results show that the proposed KLD-based TF-PCD algorithm achieved an accuracy of 0.972, the false positive rate of 0.037, and the F-measure of 0.978. Such results were significant compared to the related work studies. Thus, the proposed KLD-based TF-PCD algorithm contributes to improving the security of cyberspace.

CONCLUSION

New meaningful characteristics have been added by the proposed algorithm to promote the learned knowledge of the classifiers, and thus increase their ability to classify malicious behaviors accurately.

摘要

背景

恶意软件是数字领域主要的安全隐患。传统的网络安全解决方案受到复杂恶意行为的挑战。当前,恶意行为与合法行为之间的重叠使得将这些行为界定为恶意或合法活动变得更加困难。例如,逃避检测的恶意软件常常模仿合法行为,并且合法软件和恶意软件都会使用逃避技术。

问题

现有的大多数解决方案使用传统的词频逆文档频率(TF-IDF)技术或其概念来表示恶意软件行为。然而,传统的TF-IDF及其改进技术无法准确表示特征,尤其是共享特征,因为这些技术在计算每个特征的权重时没有考虑其在每个类别中的分布;相反,生成的权重是基于该特征在所有文档中的分布生成的。这种假设会降低这些特征的意义,并且当这些特征用于对恶意软件进行分类时,会导致高误报率。

方法

本研究提出了一种基于库尔贝克-莱布勒散度的词频-概率类分布(基于KLD的TF-PCD)算法,用于根据恶意软件和良性类别中词项概率分布的差异来表示提取的特征。与现有解决方案不同,该算法通过使用库尔贝克-莱布勒散度工具来测量恶意软件和良性类别中其概率分布的差异,从而增加重要特征的权重。

结果

实验结果表明,所提出的基于KLD的TF-PCD算法的准确率为0.972,误报率为0.037,F值为0.978。与相关工作研究相比,这些结果非常显著。因此,所提出的基于KLD的TF-PCD算法有助于提高网络空间的安全性。

结论

所提出的算法添加了新的有意义的特征,以促进分类器所学知识的提升,从而提高其准确分类恶意行为的能力。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4043/10557483/b62cc5826a74/peerj-cs-09-1492-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4043/10557483/a1a6dd94f564/peerj-cs-09-1492-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4043/10557483/a902918de918/peerj-cs-09-1492-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4043/10557483/ffa24c7194e6/peerj-cs-09-1492-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4043/10557483/88ac67c7294f/peerj-cs-09-1492-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4043/10557483/7181de1d3577/peerj-cs-09-1492-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4043/10557483/57859b641e61/peerj-cs-09-1492-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4043/10557483/79a32c4cf1cb/peerj-cs-09-1492-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4043/10557483/dbc877366f4e/peerj-cs-09-1492-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4043/10557483/b62cc5826a74/peerj-cs-09-1492-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4043/10557483/a1a6dd94f564/peerj-cs-09-1492-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4043/10557483/a902918de918/peerj-cs-09-1492-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4043/10557483/ffa24c7194e6/peerj-cs-09-1492-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4043/10557483/88ac67c7294f/peerj-cs-09-1492-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4043/10557483/7181de1d3577/peerj-cs-09-1492-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4043/10557483/57859b641e61/peerj-cs-09-1492-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4043/10557483/79a32c4cf1cb/peerj-cs-09-1492-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4043/10557483/dbc877366f4e/peerj-cs-09-1492-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4043/10557483/b62cc5826a74/peerj-cs-09-1492-g009.jpg

相似文献

1
A Kullback-Liebler divergence-based representation algorithm for malware detection.一种基于库尔贝克-莱布勒散度的恶意软件检测表示算法。
PeerJ Comput Sci. 2023 Sep 22;9:e1492. doi: 10.7717/peerj-cs.1492. eCollection 2023.
2
A detection method for android application security based on TF-IDF and machine learning.基于 TF-IDF 和机器学习的安卓应用安全检测方法。
PLoS One. 2020 Sep 11;15(9):e0238694. doi: 10.1371/journal.pone.0238694. eCollection 2020.
3
Sparse attention with residual pyramidal depthwise separable convolutional based malware detection with optimization mechanism.基于带有优化机制的残差金字塔深度可分离卷积的稀疏注意力恶意软件检测
Sci Rep. 2024 Oct 18;14(1):24414. doi: 10.1038/s41598-024-76193-4.
4
An Insight into the Machine-Learning-Based Fileless Malware Detection.基于机器学习的无文件恶意软件检测的深入分析。
Sensors (Basel). 2023 Jan 5;23(2):612. doi: 10.3390/s23020612.
5
FILM: Filtering and Machine Learning for Malware Detection in Edge Computing.FILM:边缘计算中用于恶意软件检测的过滤与机器学习
Sensors (Basel). 2022 Mar 10;22(6):2150. doi: 10.3390/s22062150.
6
Deep-Hook: A trusted deep learning-based framework for unknown malware detection and classification in Linux cloud environments.深钩:一种基于深度学习的可信框架,用于在 Linux 云环境中检测和分类未知恶意软件。
Neural Netw. 2021 Dec;144:648-685. doi: 10.1016/j.neunet.2021.09.019. Epub 2021 Oct 2.
7
An Android Malware Detection Approach to Enhance Node Feature Differences in a Function Call Graph Based on GCNs.基于 GCN 的函数调用图中节点特征差异增强的安卓恶意软件检测方法。
Sensors (Basel). 2023 May 13;23(10):4729. doi: 10.3390/s23104729.
8
Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning.基于网络威胁情报的集成学习恶意 URL 检测模型。
Sensors (Basel). 2022 Apr 28;22(9):3373. doi: 10.3390/s22093373.
9
Enhancing Cyber-Resilience for Small and Medium-Sized Organizations with Prescriptive Malware Analysis, Detection and Response.通过规范性恶意软件分析、检测和响应增强中小型组织的网络弹性。
Sensors (Basel). 2023 Jul 28;23(15):6757. doi: 10.3390/s23156757.
10
Randomized Prediction Games for Adversarial Machine Learning.对抗机器学习的随机预测游戏。
IEEE Trans Neural Netw Learn Syst. 2017 Nov;28(11):2466-2478. doi: 10.1109/TNNLS.2016.2593488.

本文引用的文献

1
Malware detection framework based on graph variational autoencoder extracted embeddings from API-call graphs.基于图变分自编码器的恶意软件检测框架从应用程序编程接口调用图中提取嵌入。
PeerJ Comput Sci. 2022 May 18;8:e988. doi: 10.7717/peerj-cs.988. eCollection 2022.
2
The rise of obfuscated Android malware and impacts on detection methods.混淆式安卓恶意软件的兴起及其对检测方法的影响。
PeerJ Comput Sci. 2022 Mar 9;8:e907. doi: 10.7717/peerj-cs.907. eCollection 2022.
3
AndroAnalyzer: android malicious software detection based on deep learning.
安卓分析器:基于深度学习的安卓恶意软件检测
PeerJ Comput Sci. 2021 May 10;7:e533. doi: 10.7717/peerj-cs.533. eCollection 2021.
4
Data augmentation based malware detection using convolutional neural networks.基于数据增强的卷积神经网络恶意软件检测
PeerJ Comput Sci. 2021 Jan 22;7:e346. doi: 10.7717/peerj-cs.346. eCollection 2021.
5
Deep learning based Sequential model for malware analysis using Windows exe API Calls.基于深度学习的使用Windows可执行文件应用程序编程接口调用进行恶意软件分析的序列模型。
PeerJ Comput Sci. 2020 Jul 27;6:e285. doi: 10.7717/peerj-cs.285. eCollection 2020.