Novel unwanted code detecting method based on characteristics of function call relationship graph

A function call relationship, malicious code detection technology, applied in electrical digital data processing, instrument, platform integrity maintenance, etc., can solve the problem that users cannot deal with security threats in time, reduce detection effect, and local characteristics are not fixed.

Active Publication Date: 2011-04-27
SICHUAN UNIV
View PDF2 Cites 66 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] First, the detection method based on the signature needs to obtain the signature of the malicious code, and transfer the ever-increasing signature to the database of the client, and the maintenance of the increasingly large database becomes the price paid by the user
The biggest disadvantage of this detection method is that it is difficult to detect unknown malicious codes, and users cannot deal with new security threats in a timely manner.
[0007] Second, heuristic analysis or software behavior-based detection methods are used to classify software by obtaining special local inform

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Novel unwanted code detecting method based on characteristics of function call relationship graph
  • Novel unwanted code detecting method based on characteristics of function call relationship graph
  • Novel unwanted code detecting method based on characteristics of function call relationship graph

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment

[0154] Brief information on the experimental datasets employed in the method of the present invention is described in Table 2. The normal files of the experimental data set are the system files and applications in Windows XP sp3 collected in the laboratory; the malicious codes are some virus files downloaded from the Malfease datasets website. The process of sample file processing includes disassembly, generating a function call graph, extracting graph feature indicators from it, and saving these data in arff type files. In the verification process of the method of the present invention, 10 fold cross-validation is adopted, and different classification algorithms are used in the testing process.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a novel unwanted code detecting method based on the characteristics of a function call relationship graph. The traditional feature code detection technique which judges software by local characteristics has the drawback that a detecting tool is required to maintain a large amount of prior feature codes and the drawback that detecting schemes lack necessary stability and reliability. The method detects unwanted codes by extracting graph characteristic information on the basis of the function call relationship graph and the research results in existing software network. The main process of the method consists of three steps: 1, establishing a software function call graph; 2, extracting characteristic indexes from the graph; and 3, differentiating unwanted software and normal software by an effective data mining algorithm. The method can effectively detect common zero-day unwanted code and well detect unwanted codes adopting a fuzzy and polymorphic technique and can keep high stability in case of a calculated attack.

Description

technical field [0001] The invention relates to malicious software detection in computer information security, in particular to a novel and practical malicious code detection method based on the feature of software function call relation graph. Background technique [0002] With the wide application of computer science in various fields of society, the security of computer software has attracted more and more attention. Establishing a trusted software system has become an effective means to maintain computer information security, and the detection of malicious code has become the core research direction of software credibility analysis. [0003] The traditional signature-based detection method needs to be updated and maintained through a dedicated database to extract relevant signatures in advance, use the scanning engine to find the local information of the software, and use the string matching method to compare the similarity between these information and signatures. Accor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00G06F21/56
Inventor 王俊峰赵宗渠白金荣刘达富方智阳
Owner SICHUAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products