首页> 外文会议>NSS 2013 >Leveraging String Kernels for Malware Detection
【24h】

Leveraging String Kernels for Malware Detection

机译:利用字符串内核进行恶意软件检测

获取原文

摘要

Signature-based malware detection will always be a step behind as novel malware cannot be detected. On the other hand, machine learning-based methods are capable of detecting novel malware but classification is frequently done in an offline or batched manner and is often associated with time overheads that make it impractical. We propose an approach that bridges this gap. This approach makes use of a support vector machine (SVM) to classify system call traces. In contrast to other methods that use system call traces for malware detection, our approach makes use of a string kernel to make better use of the sequential information inherent in a system call trace. By classifying system call traces in small sections and keeping a moving average over the probability estimates produced by the SVM, our approach is capable of detecting malicious behavior online and achieves great accuracy.
机译:基于签名的恶意软件检测将始终是落后的步骤,因为无法检测到新的恶意软件。另一方面,基于机器学习的方法能够检测新的恶意软件,但是分类通常以离线或批量方式进行,并且通常与使其不切实际的时间开销相关联。我们提出了一种桥梁这种差距的方法。这种方法利用支持向量机(SVM)来对系统调用迹线进行分类。与使用系统调用跟踪进行恶意软件检测的其他方法相比,我们的方法利用String内核来更好地利用系统调用跟踪中固有的顺序信息。通过在小部分中分类系统呼叫跟踪并保持平均在SVM产生的概率估计上,我们的方法能够在线检测恶意行为并实现高精度。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号