Selected article for: "analysis method and component analysis"

Author: Li, Shanxi; Zhou, Qingguo; Zhou, Rui; Lv, Qingquan
Title: Intelligent malware detection based on graph convolutional network
  • Cord-id: azm7e06x
  • Document date: 2021_8_24
  • ID: azm7e06x
    Snippet: Malware has seriously threatened the safety of computer systems for a long time. Due to the rapid development of anti-detection technology, traditional detection methods based on static analysis and dynamic analysis have limited effects. With its better predictive performance, AI-based malware detection has been increasingly used to deal with malware in recent years. However, due to the diversity of malware, it is difficult to extract feature from malware, which make malware detection not conduc
    Document: Malware has seriously threatened the safety of computer systems for a long time. Due to the rapid development of anti-detection technology, traditional detection methods based on static analysis and dynamic analysis have limited effects. With its better predictive performance, AI-based malware detection has been increasingly used to deal with malware in recent years. However, due to the diversity of malware, it is difficult to extract feature from malware, which make malware detection not conductive to the application of AI technology. To solve the problem, a malware classifier based on graph convolutional network is designed to adapt to the difference of malware characteristics. The specific method is to firstly extract the API call sequence from the malware code and generate a directed cycle graph, then use the Markov chain and principal component analysis method to extract the feature map of the graph, and design a classifier based on graph convolutional network, and finally analyze and compare the performance of the method. The results show that the method has better performance in most detection, and the highest accuracy is [Formula: see text] , compared with existing methods, our model is superior to other methods in terms of FPR and accuracy. It is also stable to deal with the development and growth of malware.

    Search related documents:
    Co phrase search for related documents
    • abnormal program behavior and machine learning: 1
    • accuracy accuracy and loss function: 1
    • accuracy accuracy and machine learning: 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46
    • accuracy accuracy and machine learning deep learning: 1, 2, 3, 4
    • accuracy accuracy and machine learning model: 1, 2, 3, 4, 5, 6, 7
    • accuracy accuracy and machine learning technology: 1, 2