帮助 关于我们

返回检索结果

基于数据挖掘的恶意代码检测综述
Review of Malware Detection Based on Data Mining

查看参考文献40篇

文摘 数据挖掘是一种基于统计学的自动发掘数据规律的方法,它能通过分析海量样本的统计规律来建立判别模型,从而让攻击者难以掌握免杀的规律,近年来得到了广泛关注和快速发展。综述了数据挖掘技术应用于恶意代码检测领域所取得的研究成果;对所涉及的特征提取、特征选择、分类模型及其性能评估方法等方面的研究成果进行了深入分析和比较;最后提出了基于数据挖掘的恶意代码检测所面临的挑战,并对研究方向进行了展望。
其他语种文摘 Data mining is a method for automatically discovering data rule based on statistics which can analyze huge amounts of sample statistics to establish discriminative model,so that an attacker can not master the law to avoid detection. It has attracted widespread interests and has developed rapidly in recent years.In this paper,the research on malware detection based on data mining was summarized.The research results on feature extraction,feature selection,classification model and its performance evaluation methods were analyzed and compared in detail.At last,the challenges and prospect were provided in the field.
来源 计算机科学 ,2016,43(7):13-18,56 【扩展库】
DOI 10.11896/j.issn.1002-137X.2016.7.002
关键词 数据挖掘 ; 机器学习 ; 恶意代码检测 ; 特征提取 ; 特征选择
地址

沈阳理工大学信息科学与工程学院, 沈阳, 110159

语种 中文
文献类型 综述型
ISSN 1002-137X
学科 自动化技术、计算机技术
基金 国家自然科学基金
文献收藏号 CSCD:5784576

参考文献 共 40 共2页

1.  Lee D H. A study on malicious codes pattern analysis using visualization. 2011 International Conference on Information Science and Applications(ICISA),2011:1-5 被引 1    
2.  Zhang Jia. AMCAS:An Automatic Malicious Code Analysis System. Proc.of the 9th International Conference on Web-age Information Management,2008:501-507 被引 1    
3.  Shabtai A. Detection of malicious code by applying machine learning classifiers on static features:A state-of-the-art survey. Information Security Technical Report,2009,14(1):16-29 被引 11    
4.  Kolter J Z. Learning to detect and classify malicious executables in the wild. The Journal of Machine Learning Research,2006,7:2721-2744 被引 19    
5.  Schultz M G. Data mining methods for detection of new malicious executables. 2001 IEEE Symposium on Security and Privacy,2001(S&P 2001),2001:38-49 被引 1    
6.  宋宗成. 统计自然语言处理,2013 被引 1    
7.  Abou-Assaleh T. N-gram-based detection of new malicious code. Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004(COMPSAC 2004), 2,2004:41-42 被引 1    
8.  Shabtai A. Detecting unknown malicious code by applying classification techniques on opcode patterns. Security Informatics,2012,1(1):1-22 被引 10    
9.  Karim M E. Malware phylogeny generation using permutations of code. Journal in Computer Virology,2005,1(1/2):13-23 被引 3    
10.  Bilar D. Opcodes as predictor for malware. International Journal of Electronic Security and Digital Forensics,2007,1(2):156-168 被引 8    
11.  Moskovitch R. Unknown malcode detection using OPCODE epresentation. Intelligence and Security Informatics,2008:204-215 被引 2    
12.  Moskovitch R. Unknown malcode detection via text categorization and the imbalance problem. IEEE International Conference on Intelligence and Security Informatics, 2008(ISI 2008),2008:156-161 被引 1    
13.  Lai Y. A feature selection for malicious detection. Ninth ACIS International Conference on Software Engineering,Artificial Intelligence,Networking,and Parallel/Distributed Computing, 2008(SNPD'08),2008:365-370 被引 1    
14.  Ding Y. A fast malware detection algorithm based on objective-oriented association mining. Computers & Security,2013,39:315-324 被引 3    
15.  王新宇. FP-growth算法的实现方法研究. 计算机工程与应用,2004,40(9):174-176 被引 3    
16.  Zhao Z. An unknown malware detection scheme based on the features of graph. Security and Communication Networks,2013,6(2):239-246 被引 1    
17.  汪云云. 基于AUC的分类器评价和设计综述. 模式识别与人工智能,2011,24(1):64-71 被引 24    
18.  Komashinskiy D. Malware detection by data mining techniques based on positionally dependent features. 2010 18th Euromicro International Conference on Parallel,Distributed and Network-Based Processing(PDP),2010:617-623 被引 1    
19.  Brown P F. Class-based n-gram models of natural language. Computational Linguistics,1992,18(4):467-479 被引 56    
20.  Cavnar W B. N-gram-based text categorization. Ann Arbor MI,1994,48113(2):161-175 被引 3    
引证文献 1

1 林杨东 恶意PDF文档检测技术研究进展 计算机应用研究,2018,35(8):2251-2255
被引 0 次

显示所有1篇文献

论文科学数据集
PlumX Metrics
相关文献

 作者相关
 关键词相关
 参考文献相关

版权所有 ©2008 中国科学院文献情报中心 制作维护:中国科学院文献情报中心
地址:北京中关村北四环西路33号 邮政编码:100190 联系电话:(010)82627496 E-mail:cscd@mail.las.ac.cn 京ICP备05002861号-4 | 京公网安备11010802043238号