999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Machine learning and malicious file detection

2018-10-19 09:11:24HuanchengSongFanzengXiaChuntingXu
西部論叢 2018年11期

Huancheng Song Fanzeng (Alex) Xia Chunting Xu

1.Introduction

With the development of computer network and the growth in the means of programming, conventional malicious file detection methods seem obviously inadequate. Traditional embedded security mechanisms like distributed IDS and firewall are no longer enough to secure the next generation Internet because of the unbounded concerns over network access control and software verification. Recent research has confirmed the promise of machine learning for many kinds of anomaly detection. The malicious file detection based on behavior is a method which achieves detection via making use of the peculiar behavior features of malicious files. In order to protect our computer systems from signature-unknown malicious files, in this paper we focus on static & dynamic machine learning methods and describe their pros and cons.

2. Proposed method

File analysis methods can be divided to two categories: static analysis and dynamic analysis, and both of them can be used in conjunction with machine learning. Our methods are aimed at extracting prominent information from the examined file and use both static and dynamic analysis. After we get the signature-unknown files from the Internet, firstly all the embedded files(probably malicious) must be recursively extracted in order to analyze them as well. Then we check the compatibility of these files and send the suitable files to our detection model based on SVM and active learning using static and dynamic behaviors. Finally after several retrainings we can determine malicious labeled files and benign labeled files.

2.1 Static Analysis

Static analysis methods extract data from the examined file and analyze it without actually excuting the file. Before starting a static analysis of reading the binary code, the code needs to be translated to assembly level. By looking at the file's content and structure, we can extract discriminative behavior features and build general benign patterns. Afterwards, we could find the malicious files based on anomaly detection.

The advantages of static analysis is that it can scrutinize the file's "genes", and it's usually simple and efficient. Static analysis approaches are easy to implement, monitor and measure. Compared to dynamic approaches, static analysis is relatively faster which is good for inspection in real time systems. It's also safe for user's machine since the examiner machine cannot become infected without executing the files. However, static analysis is subjected to obfuscated techniques that can evade it. Also it ignores the changes that made to the code during execution. As sometimes we cannot fully expect the actual behavior of the file during runtime, and that is the reason why our proposed file analysis method uses both static and dynamic analysis.

2.2 Dynamic Analysis

Dynamic analysis is also known as "behavioral analysis". It examines the actions and behavior of the suspected file during runtime. The process of the analysis is usually in an isolated environment (Sandbox / VM) in order to protect the host machine. After the code is executed, the abstraction level can be varied between lowest level (the binary code itself) and the highest level (observable effects it has on the system as-a-whole). For example, some changes made to the file system, Registry keys, the OS's configurations, etc. can only be detected during runtime

To start a dynamic analysis, A clean system need to be start firstly, then a sample (script/code) is loaded into the system. By launching the analysis tool(s), the sample is executed. Afterwards, the report produced can be examined. Finally, the system is reverted to a clean state and repeat.

The advantage of dynamic analysis is that it can examines the behavior of the file from which the malicious files can not evade by code obfuscation techniques, encrypyion, etc. The disadvantages are that dynamic analysis is much slower in conparison to statc analysis and is hard to implement. Computational complexity, resource demands and time consumption must be considered in dynamic analysis. Also, It is difficult to simulate the appropriate conditions in which the malicious functions of the program will be activated (vulnerability that the malware exploits). And when executed, the examined file can also detect that it is being analyzed and change its behavior.

3. References

Bayer, U., Moser, A., Kruegel, C., & Kirda, E. (2006). Dynamic analysis of malicious code Journal in Computer Virology, 2(1),67-77.

Nissim, N., Cohen, A., Glezer, C., & Elovici, Y. (2015). Detection of malicious PDF files and directions for enhancements: a state-of-the art survey. Computers & Security, 48, 246-266.

主站蜘蛛池模板: 国产成人亚洲日韩欧美电影| 91九色最新地址| 国产欧美日韩18| 欧美成人免费一区在线播放| 国产成人综合亚洲欧洲色就色| 国产精品人莉莉成在线播放| 免费在线色| 五月综合色婷婷| 福利在线不卡| 亚洲一区二区成人| 亚洲欧美人成人让影院| 啦啦啦网站在线观看a毛片| 国语少妇高潮| 日本高清有码人妻| 亚洲精品黄| 国产91麻豆免费观看| 午夜三级在线| 亚洲Av激情网五月天| 高清无码一本到东京热| 精品一区国产精品| 精品国产成人国产在线| 欧美日韩一区二区在线播放 | 成人一级黄色毛片| 久久久亚洲色| 99re精彩视频| 精品伊人久久久大香线蕉欧美| 91毛片网| 日本人妻一区二区三区不卡影院 | 香港一级毛片免费看| 国产成人高清精品免费5388| 激情六月丁香婷婷四房播| 欧美在线黄| 亚洲国产综合第一精品小说| 在线日韩日本国产亚洲| 精品欧美日韩国产日漫一区不卡| 久久久精品久久久久三级| 欧美精品成人一区二区在线观看| 日本91视频| 亚洲自拍另类| 欧美笫一页| 色老二精品视频在线观看| 秋霞国产在线| 激情网址在线观看| 欧美午夜在线播放| 免费福利视频网站| 精品国产福利在线| 91成人在线观看| 亚洲精品视频在线观看视频| 女高中生自慰污污网站| 国产福利一区二区在线观看| 天天综合网在线| 国产打屁股免费区网站| 97视频免费在线观看| 国产福利免费视频| 国内精品伊人久久久久7777人| 午夜视频免费一区二区在线看| 色综合手机在线| 国产jizzjizz视频| 国产网站黄| 青青青国产免费线在| 啪啪永久免费av| 日本一区二区三区精品AⅤ| 欧美在线一二区| 亚洲侵犯无码网址在线观看| 中文字幕 欧美日韩| 亚洲国产欧洲精品路线久久| 国产精品网址在线观看你懂的| 色网站在线视频| 97久久精品人人| 草草线在成年免费视频2| 亚洲色图欧美激情| 亚洲视频三级| 夜夜高潮夜夜爽国产伦精品| 欧美精品aⅴ在线视频| www.精品国产| 国产精品亚洲一区二区在线观看| 情侣午夜国产在线一区无码| 午夜福利视频一区| 在线一级毛片| 91小视频在线观看免费版高清| 青青草国产在线视频| 免费人成在线观看成人片|