首页> 外文期刊>Future generation computer systems >A hybrid-multi filter-wrapper framework to identify run-time behaviour for fast malware detection
【24h】

A hybrid-multi filter-wrapper framework to identify run-time behaviour for fast malware detection

机译:混合多过滤器包装器框架,用于识别运行时行为以快速检测恶意软件

获取原文
获取原文并翻译 | 示例
       

摘要

Malicious software (malware) constitute one of the most pressing cyber threats intended to cripple critical infrastructure, render infected systems unusable, permanently erase data from storage systems. The number of malware has skyrocketed through the use of enormous malware development toolkit. Run-time analysis has recently been used to overcome the limitations of current detection engines due to code obfuscation techniques such as polymorphism and metamorphism. However run-time approaches face a critical challenge of processing a large number of run-time malware features which may fail to provide real time protection. In this paper, we propose a hybrid framework by using more than one complementary filters and a wrapper feature selection approach to identify the most significant run-time behavioural characteristics of malware. The novelty of the proposed framework is that it exploits the complementary characteristics of within-filters and between wrapper-filters by hybridizing discriminant, minimum redundant, and maximum relevant filters with the wrapper approach to integrate the knowledge from the intrinsic characteristics of the run-time behaviour of malware obtained by the filters into the wrapper selection process. We have verified the performance of the proposed approach through extensive experiments using large real malware datasets. The results of the experiments show that the proposed framework finds the most significant run-time characteristics of malware. When these are used in the detection engine, the computational performances and detection accuracies are also improved up to99.499%compared to any existing techniques.
机译:恶意软件(malware)构成了最紧迫的网络威胁之一,旨在破坏关键基础设施,使受感染的系统无法使用,永久删除存储系统中的数据。通过使用庞大的恶意软件开发工具包,恶意软件的数量猛增。由于代码混淆技术(例如多态性和变质性),最近已使用运行时分析来克服当前检测引擎的局限性。但是,运行时方法面临处理大量运行时恶意软件功能的严峻挑战,这些功能可能无法提供实时保护。在本文中,我们提出了一种混合框架,该框架使用多个补充过滤器和包装器特征选择方法来识别恶意软件的最重要的运行时行为特征。所提出框架的新颖之处在于,它通过将判别,最小冗余和最大相关滤波器与包装器方法进行混合,以利用运行时的固有特性来整合知识,从而利用内部过滤器和包装器过滤器之间的互补特性。过滤器进入包装选择过程的恶意软件行为。我们通过使用大型真实恶意软件数据集进行的广泛实验,验证了所提出方法的性能。实验结果表明,提出的框架找到了恶意软件最重要的运行时特征。当将它们用于检测引擎时,与任何现有技术相比,其计算性能和检测精度也可提高高达99.499%。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号