基于机器学习的内核恶意程序检测研究与实现

Translated title of the contribution: Research and Implementation of Kernel Malicious Code Detection Based on Machine Learning

Dong Hai Tian, Hang Wei*, Bo Zhang, Yu Lei Yu, Jia Suo Li, Rui Ma

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

4 Citations (Scopus)

Abstract

With the development of computer science, the world is becoming more and more dependent on computers, and computer security is becoming more and more important. Malicious code is the biggest enemy of computer security. In this paper, a new method was proposed based on machine learning and new classification features to identify malicious programs, make a preliminary family classification of them, point out some shortcomings of previous machine learning in malicious code detection and classification, and screen out better distinguishing features. Firstly, n-gram algorithm was used to optimize the opcode characteristics in the disassembly code of malicious code. And then a Bag of Words model and TF-IDF algorithm were used to optimize the API call characteristics. Finally, a model was programmed and the data set was used to train and test the model. In the experiment, the classification accuracy of the model with decision tree algorithm can reach 87.41%, and the classification accuracy of the model with random forest algorithm can reach 90.06%. The experimental results show that, compared with others presented in the detection and classification of malicious code, the features of proposed method can achieve a better effect.

Translated title of the contributionResearch and Implementation of Kernel Malicious Code Detection Based on Machine Learning
Original languageChinese (Traditional)
Pages (from-to)1295-1301
Number of pages7
JournalBeijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology
Volume40
Issue number12
DOIs
Publication statusPublished - Dec 2020

Fingerprint

Dive into the research topics of 'Research and Implementation of Kernel Malicious Code Detection Based on Machine Learning'. Together they form a unique fingerprint.

Cite this