Javascript must be enabled to continue!
Design of Malicious Code Detection System Based on Binary Code Slicing
View through CrossRef
<p>Malicious code threatens the safety of computer systems. Researching malicious code design techniques and mastering code behavior patterns are the basic work of network security prevention. With the game of network offense and defense, malicious code shows the characteristics of invisibility, polymorphism, and multi-dismutation. How to correctly and effectively understand malicious code and extract the key malicious features is the main goal of malicious code detection technology. As an important method of program understanding, program slicing is used to analyze the program code by using the idea of “decomposition”, and then extract the code fragments that the analyst is interested in. In recent years, data mining and machine learning techniques have been applied to the field of malicious code detection. The reason why it has become the focus of research is that it can use data mining to dig out meaningful patterns from a large amount of existing code data. Machine learning can It helps to summarize the identification knowledge of known malicious code, so as to conduct similarity search and help find unknown malicious code. The machine learning heuristic malicious code detection method firstly needs to automatically or manually extract the structure, function and behavior characteristics of the malicious code, so we can first slice the malicious code and then perform the detection. Through the improvement of the classic program slicing algorithm, this paper effectively improves the slicing problem between binary code processes. At the same time, it implements a malicious code detection system. The machine code byte sequence variable-length N-gram is used as the feature extraction method to further prove that the efficiency and accuracy of malicious code detection technology based on data mining and machine learning. </p>
<p> </p>
Computer Society of the Republic of China
Title: Design of Malicious Code Detection System Based on Binary Code Slicing
Description:
<p>Malicious code threatens the safety of computer systems.
Researching malicious code design techniques and mastering code behavior patterns are the basic work of network security prevention.
With the game of network offense and defense, malicious code shows the characteristics of invisibility, polymorphism, and multi-dismutation.
How to correctly and effectively understand malicious code and extract the key malicious features is the main goal of malicious code detection technology.
As an important method of program understanding, program slicing is used to analyze the program code by using the idea of “decomposition”, and then extract the code fragments that the analyst is interested in.
In recent years, data mining and machine learning techniques have been applied to the field of malicious code detection.
The reason why it has become the focus of research is that it can use data mining to dig out meaningful patterns from a large amount of existing code data.
Machine learning can It helps to summarize the identification knowledge of known malicious code, so as to conduct similarity search and help find unknown malicious code.
The machine learning heuristic malicious code detection method firstly needs to automatically or manually extract the structure, function and behavior characteristics of the malicious code, so we can first slice the malicious code and then perform the detection.
Through the improvement of the classic program slicing algorithm, this paper effectively improves the slicing problem between binary code processes.
At the same time, it implements a malicious code detection system.
The machine code byte sequence variable-length N-gram is used as the feature extraction method to further prove that the efficiency and accuracy of malicious code detection technology based on data mining and machine learning.
</p>
<p> </p>.
Related Results
Resource allocation and management techniques for network slicing in WiFi networks
Resource allocation and management techniques for network slicing in WiFi networks
Network slicing has recently been proposed as one of the main enablers for 5G networks; it is bound to cope with the increasing and heterogeneous performance requirements of these ...
Lifelong AI-driven zero-touch network slicing
Lifelong AI-driven zero-touch network slicing
(English) The sixth-generation (6G) network's evolution necessitates advancements in algorithms and architecture to transition from an AI-native to an intrinsic trustworthy automat...
5G Network Slicing Using Deep Learning for Hospital of The Future
5G Network Slicing Using Deep Learning for Hospital of The Future
Effective health management is essential, yet hindered by challenges in traditional healthcare systems and an uneven physician-to-population ratio. The integration of 5G networks i...
Design and Performance Evaluation of a Cashew Apple (Anacardium occidentale L.) Slicing Machine
Design and Performance Evaluation of a Cashew Apple (Anacardium occidentale L.) Slicing Machine
One challenge in cashew apple (CA) production is the absence of processing equipment, leading to manual operations. Cashew apple processors often resort to manual slicing, resultin...
PERANCANGAN MESIN PENGIRIS TEMPE SEMIOTOMATIS DENGAN ARAH PENGIRISAN HORIZONTAL
PERANCANGAN MESIN PENGIRIS TEMPE SEMIOTOMATIS DENGAN ARAH PENGIRISAN HORIZONTAL
The tempeh slicing machine is a tool to assist the production of tempeh chips used by chips SMEs. For now, there are still many MSME chips that slice tempeh manually using a knife ...
Converged RAN/MEC slicing in beyond 5G (B5G) networks
Converged RAN/MEC slicing in beyond 5G (B5G) networks
(English) The main objective of this thesis is to propose solutions for implementing dynamic RAN slicing and Functional Split (FS) along with MEC placements in 5G/B5G. In particula...
Construction of a Cybersecurity Behavior Knowledge Base for Malicious Behavior Analysis
Construction of a Cybersecurity Behavior Knowledge Base for Malicious Behavior Analysis
Facing the surge in malicious behaviors in the network environment, the existing cybersecurity knowledge graph suffers from fragmented security knowledge and limited application sc...
Construction of a Cybersecurity Behavior Knowledge Base for Malicious Behavior Analysis
Construction of a Cybersecurity Behavior Knowledge Base for Malicious Behavior Analysis
Facing the surge in malicious behaviors in the network environment, the existing cybersecurity knowledge graph suffers from fragmented security knowledge and limited application sc...

