Research On Malicious Code Homology Analysis Method Based On Texture Fingerprint Clustering

2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE)(2018)

Cited 3|Views9
No score
Abstract
In recent years, the number of malware and malicious code variants has increased dramatically, which results in serious problems in the network security field. However, the existing method is not accurate and efficient. In order to improve the method, we study and find that there are commonalities between the malicious software and image recognition. Therefore, we introduce the image feature extraction technology and propose a malicious code homology analysis method based on the texture fingerprint clustering. The binary malicious programs which are no source code can be visualized by this way, and the image texture fingerprint information be analyzed so that the type and family of malicious programs can be found more efficiently and accurately. In addition, this paper designs and implements a prototype experiment to verify the validity of the method. The results show that the malicious code homology analysis method based on the texture fingerprint clustering is effective and accurate to analyze the homology.
More
Translated text
Key words
network security,homology analysis,image extraction,clustering,texture fingerprint
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined