Research on Classification of Malware Source Code

来源 :Journal of Shanghai Jiaotong University(Science) | 被引量 : 0次 | 上传用户:hanyancuiceo
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
In the face threat of the Internet attack, malware classification is one of the promising solutions in the field of intrusion detection and digital forensics. In previous work, researchers performed dynamic analysis or static analysis after reverse engineering. But malware developers even use anti-virtual machine(VM) and obfuscation techniques to evade malware classifiers. By means of the deployment of honeypots, malware source code could be collected and analyzed. Source code analysis provides a better classification for understanding the purpose of attackers and forensics. In this paper, a novel classification approach is proposed, based on content similarity and directory structure similarity. Such a classification avoids to re-analyze known malware and allocates resources for new malware. Malware classification also let network administrators know the purpose of attackers. The experimental results demonstrate that the proposed system can classify the malware efficiently with a small misclassification ratio and the performance is better than virustotal. In the face threat of the Internet attack, malware classification is one of the promising solutions in the field of intrusion detection and digital forensics. Previous work, researchers performed dynamic analysis or static analysis after reverse engineering. But malware developers even use anti-virtual By means of the deployment of honeypots, malware source code could be collected and analyzed. Source code analysis provides a better classification for understanding the purpose of attackers and forensics. In this paper, a novel classification approach is proposed, based on content similarity and directory structure similarity. Such an classification avoids to re-analyze known malware and allocates resources for new malware. The experimental results demonstrate that the proposed system can classify the malware efficiently with a smal l misclassification ratio and the performance is better than virustotal.
其他文献
介绍Mashup的概念和基本应用,结合对豆瓣网的分析,利用Mashup技术将豆瓣网的图书评价推介功能和图书馆的OPAC系统融合起来,提高图书馆的服务能力,并给出实现思路和关键代码,
采用模糊决策法对方案进行初选,采用多目标决策进行方案终选,为解决原始条件不确定型的矿井开采问题提供了新的思路和方法。 Adopting the fuzzy decision method to carry on
年轻干部如何在基层领导岗位上增长才干中共江苏省东海县委书记王向明我今年38岁,1983年以来在江苏省连云港市担任了两年团市委书记、五年区委书记、两年市委宣传部常务副部长,目前担任东海县委书记。不同的工作岗位给我提供了宽广的领域,使我面对着更多的挑战和...
目的:探讨莫沙必利与多潘立酮治疗功能性消化不良的临床效果。方法:选取2015/3-2017/3我院收治的100例功能性消化不良患者作为研究对象,根据治疗药物差异将全部患者分成莫沙
秦桧是中国历史上众所周知的十大奸臣之一,因以“莫须有”的罪名处死岳飞而遗臭万年。而秦桧乃江宁府人,也就是南京人氏,这一点长期以来鲜为南京人所提及。据文献记载,宋徽宗
目的:观察不同治疗方案用于重症肝炎和肝硬化并发自发性细菌性腹膜炎患者的实际疗效,探讨该类型患者的治疗方案选择。方法:选择2015年1月至2015年12月我院收治的56例重症肝炎
清迈清迈为泰国第二大城市,古今皆有豪华皇家苑林和著名佛教寺庙。歌后邓丽君有别墅在此,伊亦仙逝于该城。名列泰国第二京,气候凉爽称胜境。 Chiang Mai, Chiang Mai Thaila
目的:探讨康复新液联合胶体果胶铋兰索拉唑四联在难治性消化性溃疡治疗中临床效果。方法:采用随机数字表法为分组依据,将2016年1月至2017年1月就诊于我院的120例难治性消化性
目的:探讨血管内皮损伤及血小板激活因子在维吾尔族妊娠期妇女合并DVT患者中的表达。方法:对入选对象血液中的血管性假血友病因子(vWF)、血栓烷B2(TXB2)、血小板a颗粒膜蛋白(
“十一”黄金周期间,农八师152团“军垦第一连”大礼堂里热闹非凡,来自全国各地的游客在这里了解兵团屯垦戍边历史,体验兵团特有的军垦文化。“打竹板走上台,心里高兴说起来;