首页 | 官方网站   微博 | 高级检索  
     

一种基于深度学习的恶意代码克隆检测技术
引用本文:沈元,严寒冰,夏春和,韩志辉.一种基于深度学习的恶意代码克隆检测技术[J].北京航空航天大学学报,2022,48(2):282-290.
作者姓名:沈元  严寒冰  夏春和  韩志辉
作者单位:1.北京航空航天大学 计算机学院, 北京 100083
基金项目:国家自然科学基金(U1736218);;国家科技重大专项(2018YFB0804704);
摘    要:恶意代码克隆检测已经成为恶意代码同源分析及高级持续性威胁(APT)攻击溯源的有效方式。从公共威胁情报中收集了不同APT组织的样本,并提出了一种基于深度学习的恶意代码克隆检测框架,目的是检测新发现的恶意代码中的函数与已知APT组织资源库中的恶意代码的相似性,以此高效地对恶意软件进行分析,进而快速判别APT攻击来源。通过反汇编技术对恶意代码进行静态分析,并利用其关键系统函数调用图及反汇编代码作为该恶意代码的特征。根据神经网络模型对APT组织资源库中的恶意代码进行分类。通过广泛评估和与MCrab模型的对比可知,改进模型优于MCrab模型,可以有效地进行恶意代码克隆检测与分类,且获得了较高的检测率。 

关 键 词:深度学习    高级持续性威胁(APT)组织    克隆检测    控制流图(CFG)    系统函数调用图
收稿时间:2020-08-09

Malicious code clone detection technology based on deep learning
SHEN Yuan,YAN Hanbing,XIA Chunhe,HAN Zhihui.Malicious code clone detection technology based on deep learning[J].Journal of Beijing University of Aeronautics and Astronautics,2022,48(2):282-290.
Authors:SHEN Yuan  YAN Hanbing  XIA Chunhe  HAN Zhihui
Affiliation:1.School of Computer Science and Engineering, Beihang University, Beijing 100083, China2.National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing 100029, China
Abstract:Malicious code clone detection has become an effective way to analyze malicious code homology and advanced persistent threat (APT) attacks. In this paper, we collect samples of different APT organizations from public threat intelligence, and propose a deep learning based malicious code clone detection framework to detect the similarity between the functions in newly discovered malicious code and the malicious code in known APT organizational resources in order to efficiently analyze malware and quickly identify the source of APT attacks. We perform static analysis of malicious code through disassembly technology, use its key function call graph and disassembly code as the features of the malicious code, and then classify the malicious code in the APT organization library according to the neural network model. Through extensive evaluation and comparison with our previous models (MCrab), the improved model is better than the previous model, which can effectively detect and classify malicious code clones and obtain higher detection rate. 
Keywords:
本文献已被 万方数据 等数据库收录!
点击此处可从《北京航空航天大学学报》浏览原始摘要信息
点击此处可从《北京航空航天大学学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号