Malware Detection Using Hidden Markov Model based on Markov Blanket Feature Selection Method

سال انتشار: 1393
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 1,412

فایل این مقاله در 6 صفحه با فرمت PDF قابل دریافت می باشد

این مقاله در بخشهای موضوعی زیر دسته بندی شده است:

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

ICKIS01_024

تاریخ نمایه سازی: 25 فروردین 1394

چکیده مقاله:

In general we categorize all malicious codes that potentially can harm a single or network of computers into malware groups. With great progress in enhancing virusdevelopment kit and various kind of malware appeared today, and increasing in number of web networks users, malwares spreading out rapidly in all aspect of computers systems. The main approach for finding and detecting malware today, is signature base methods. But with progress in developingmetamorphic malware today, these technique lost their performance to detecting malwares. In this research by usingmachine learning methods and combining them with n-gram model and use statistical analysis, a new approach introduced for detection malwares. Using markov blanket method as feature selection technique, reduced size of features approximately 86% in average. Then numbers of sequences produced to training hidden markov model. Trained HMM showed great accuracy

کلیدواژه ها:

malware detection ، hidden markov model ، n-gram ، markov blanket ، machine learning about 90% to detecting and classifying malware and benign files

نویسندگان

Bassir Pechaz

Imam Reza University Faculty of computer engineering Mashhad, Iran

Majid Vafaie Jahan

Islamic Azad University Faculty of computer engineering Mashhad, Iran

Mehrdad Jalali

Islamic Azad University Faculty of computer engineering Mashhad, Iran

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • B. Potter and G. Day, "The effectiveness of antimalwae tools, ...
  • P. Szor, The art of computer virus research and defense, ...
  • F. Cohen, "Computer viruses: Theory and expeiments, " Computer and ...
  • D. Spinellis, "Reliable Identification of B ounded-Length Viruses Is NP-Complete, ...
  • I. Yoo and V. Nitshe, "Non signature based virus detection: ...
  • J. Bergeron and M. Debibabi, "Static Analysis of binary code ...
  • M. Christodorescl and S. Jha, "Static analysis of excecutables to ...
  • M. Christodorescu. S. Jha, S. Seshia, D. Sony and R. ...
  • Proceedings of the 2005 IEEE symposium on security and privacy, ...
  • J. Kephart, G. Sorkin, W. Arnold, D. Chess, G. Tesauro ...
  • D. Bilar, "OpCodes as predicator of malware, " International journal ...
  • I. Santos, F. Brezo, J. Nieves, Y. Penya and B. ...
  • Engineering secure software and systems, INCS 5965, 2010. ...
  • Information Sciences 231, pp. 64-82, 2013. ...
  • Y.Park, D.S.Reeves and M.Stamp, "Deriving common malware behavior through graph ...
  • W. Wong, "Analysis and detection of metamorphic computer viruses, " ...
  • H. Borchani, C. Bielza, P. Martin and P Larranga, "Markov ...
  • dimensional Bayesian network classifier: An application to predict the European ...
  • L. Yu and H. Liu, "Efficient feature selection via analysis ...
  • K. Sharma, Bioinformatics, sequence alignment and markov models, McGraw-Hil Publication, ...
  • D. Powers, "Evaluation: From precision, recall and f- measure to ...
  • R. Kohavi, "A study of cross-validation and bootstrap for accuracy ...
  • نمایش کامل مراجع