999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Machine learning and malicious file detection

2018-10-19 09:11:24HuanchengSongFanzengXiaChuntingXu
西部論叢 2018年11期

Huancheng Song Fanzeng (Alex) Xia Chunting Xu

1.Introduction

With the development of computer network and the growth in the means of programming, conventional malicious file detection methods seem obviously inadequate. Traditional embedded security mechanisms like distributed IDS and firewall are no longer enough to secure the next generation Internet because of the unbounded concerns over network access control and software verification. Recent research has confirmed the promise of machine learning for many kinds of anomaly detection. The malicious file detection based on behavior is a method which achieves detection via making use of the peculiar behavior features of malicious files. In order to protect our computer systems from signature-unknown malicious files, in this paper we focus on static & dynamic machine learning methods and describe their pros and cons.

2. Proposed method

File analysis methods can be divided to two categories: static analysis and dynamic analysis, and both of them can be used in conjunction with machine learning. Our methods are aimed at extracting prominent information from the examined file and use both static and dynamic analysis. After we get the signature-unknown files from the Internet, firstly all the embedded files(probably malicious) must be recursively extracted in order to analyze them as well. Then we check the compatibility of these files and send the suitable files to our detection model based on SVM and active learning using static and dynamic behaviors. Finally after several retrainings we can determine malicious labeled files and benign labeled files.

2.1 Static Analysis

Static analysis methods extract data from the examined file and analyze it without actually excuting the file. Before starting a static analysis of reading the binary code, the code needs to be translated to assembly level. By looking at the file's content and structure, we can extract discriminative behavior features and build general benign patterns. Afterwards, we could find the malicious files based on anomaly detection.

The advantages of static analysis is that it can scrutinize the file's "genes", and it's usually simple and efficient. Static analysis approaches are easy to implement, monitor and measure. Compared to dynamic approaches, static analysis is relatively faster which is good for inspection in real time systems. It's also safe for user's machine since the examiner machine cannot become infected without executing the files. However, static analysis is subjected to obfuscated techniques that can evade it. Also it ignores the changes that made to the code during execution. As sometimes we cannot fully expect the actual behavior of the file during runtime, and that is the reason why our proposed file analysis method uses both static and dynamic analysis.

2.2 Dynamic Analysis

Dynamic analysis is also known as "behavioral analysis". It examines the actions and behavior of the suspected file during runtime. The process of the analysis is usually in an isolated environment (Sandbox / VM) in order to protect the host machine. After the code is executed, the abstraction level can be varied between lowest level (the binary code itself) and the highest level (observable effects it has on the system as-a-whole). For example, some changes made to the file system, Registry keys, the OS's configurations, etc. can only be detected during runtime

To start a dynamic analysis, A clean system need to be start firstly, then a sample (script/code) is loaded into the system. By launching the analysis tool(s), the sample is executed. Afterwards, the report produced can be examined. Finally, the system is reverted to a clean state and repeat.

The advantage of dynamic analysis is that it can examines the behavior of the file from which the malicious files can not evade by code obfuscation techniques, encrypyion, etc. The disadvantages are that dynamic analysis is much slower in conparison to statc analysis and is hard to implement. Computational complexity, resource demands and time consumption must be considered in dynamic analysis. Also, It is difficult to simulate the appropriate conditions in which the malicious functions of the program will be activated (vulnerability that the malware exploits). And when executed, the examined file can also detect that it is being analyzed and change its behavior.

3. References

Bayer, U., Moser, A., Kruegel, C., & Kirda, E. (2006). Dynamic analysis of malicious code Journal in Computer Virology, 2(1),67-77.

Nissim, N., Cohen, A., Glezer, C., & Elovici, Y. (2015). Detection of malicious PDF files and directions for enhancements: a state-of-the art survey. Computers & Security, 48, 246-266.

主站蜘蛛池模板: 极品私人尤物在线精品首页| 伊人久久婷婷| 2021国产v亚洲v天堂无码| 狠狠色丁香婷婷综合| 国产97视频在线观看| 国产福利一区在线| 色偷偷综合网| 国产91麻豆视频| 福利小视频在线播放| 亚洲免费成人网| 国产va在线观看| 国产麻豆91网在线看| 97人妻精品专区久久久久| 成人一级黄色毛片| 91免费在线看| 欧美午夜小视频| 国产精品亚欧美一区二区三区| 五月天在线网站| 欧美三级不卡在线观看视频| 成人日韩视频| 国产精品极品美女自在线网站| 国产成人调教在线视频| 亚洲精品天堂自在久久77| 尤物特级无码毛片免费| 久久久成年黄色视频| 欧美一区中文字幕| 狠狠色综合久久狠狠色综合| 久久精品66| 亚洲最大在线观看| 青青草久久伊人| 乱人伦中文视频在线观看免费| 亚州AV秘 一区二区三区| 亚洲日韩精品伊甸| 亚洲AV成人一区国产精品| 日本爱爱精品一区二区| 国产a网站| 九九九国产| 呦女精品网站| 久久久久九九精品影院 | 色老头综合网| 54pao国产成人免费视频| 日韩欧美国产综合| 一区二区欧美日韩高清免费| 成人国产精品网站在线看| 欧美a在线| 毛片大全免费观看| 国产精选小视频在线观看| 在线播放国产一区| 免费视频在线2021入口| 欧美在线伊人| 亚洲无码精彩视频在线观看| 91探花国产综合在线精品| 精品乱码久久久久久久| 四虎AV麻豆| 中文字幕啪啪| 在线综合亚洲欧美网站| 一本无码在线观看| 日韩国产无码一区| 欧洲高清无码在线| 亚洲综合国产一区二区三区| 国产亚洲精品无码专| 国产免费福利网站| 国产综合网站| 国产国拍精品视频免费看| 老司机精品一区在线视频| 91视频日本| 无码福利视频| 最新日韩AV网址在线观看| 强乱中文字幕在线播放不卡| 最近最新中文字幕免费的一页| 欧美中文字幕在线视频| 欧美v在线| 欧洲免费精品视频在线| 熟妇无码人妻| 美女裸体18禁网站| 亚洲第一av网站| 国产Av无码精品色午夜| 亚洲欧美一区在线| 国产三级国产精品国产普男人| 波多野结衣一二三| 亚洲视频四区| 精品国产99久久|