Method for constructing multi-dimensional feature map of malicious code

Haocong Ma*, Ji Zhang, Junhua Zhou, Xiang Zhai, Junjie Xue, Hang Ji

*Corresponding author for this work

Research output: Contribution to journalConference articlepeer-review

Abstract

Malicious code is characterized by a large number of types, rapid increase in number, continuous update of transmission routes, and continuous enhancement of back analysis and back detection methods. Therefore, how to effectively detect and analyze malicious code has been a problem of great concern. This paper studies the features of binary file and disassembly file of malicious code, introduces the concept of information gain, and proposes a method to construct the multi-dimensional characteristic graph of malicious code. Finally, the convolutional neural network is used to classify the multi-dimensional feature graph of malicious code, which provides a new idea for the feature extraction of malicious code.

Original languageEnglish
Article number42055
JournalJournal of Physics: Conference Series
Volume1748
Issue number4
DOIs
Publication statusPublished - 27 Jan 2021
Event2020 5th International Seminar on Computer Technology, Mechanical and Electrical Engineering, ISCME 2020 - Shenyang, Virtual, China
Duration: 30 Oct 20201 Nov 2020

Fingerprint

Dive into the research topics of 'Method for constructing multi-dimensional feature map of malicious code'. Together they form a unique fingerprint.

Cite this