Netinfo Security ›› 2019, Vol. 19 ›› Issue (12): 72-78.doi: 10.3969/j.issn.1671-1122.2019.12.009
Previous Articles Next Articles
Xuruirui FENG, Jiayong LIU(), Pengsen CHENG
Received:
2019-08-10
Online:
2019-12-10
Published:
2020-05-11
CLC Number:
Xuruirui FENG, Jiayong LIU, Pengsen CHENG. Analyzing Malware Behavior and Capability Related Text Based on Feature Extraction[J]. Netinfo Security, 2019, 19(12): 72-78.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2019.12.009
句子 | 数据集 | 标签 |
---|---|---|
All three samples provided remote access to the attacker, via two Command and Control(C2)Servers . | 训练集 | 恶意软件相关 |
The samples were clearly malicious and varied in sophistication . | 训练集 | 恶意软件不相关 |
To provide access to the server of interest the at-tackers may appropriately modify rules for firewalls Microsoft TMG, CISCO, etc . | 验证集 | 恶意软件相关 |
Here is a table with the minimal information about 46 different samples . | 验证集 | 恶意软件不相关 |
The“Cohhoc“malware uses an obfuscation layer, to disguise the malware and to complicate the analysis . | 测试集 | 恶意软件相关 |
For example, this code can perform any of the following actions. | 测试集 | 恶意软件不相关 |
[1] | WANG Shaomin, YANGDi, RENHua.Key Technology Research and Model Validation of Text Classification System Based on Deep Learning[J]. Telecommunications Science, 2018, 34(12): 117-124. |
汪少敏,杨迪,任华.基于深度学习的文本分类系统关键技术研究与模型验证[J].电信科学,2018,34(12):117-124. | |
[2] | KIM Y.Convolutional Neural Networks for Sentence Classification[C]// Association for Computational Linguistics. Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing(EMNLP), October 25-29, 2014, Doha, Qatar. Stroudsburg PA: Association for Computational Linguistics, 2014: 1746-1751. |
[3] | KALCHBRENNER N, GREFENSTETTE E, BLUNSOM P.A Convolutional Neural Network for Modelling Sentences[C]// Association for Computational Linguistics. Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics, June 22-27, 2014, Baltimore‚USA. Stroudsburg PA: Association for Computational Linguistics, 2014: 655-665. |
[4] | TANG D, QIN B, LIU T.Document Modeling with Gated Recurrent Neural Network for Sentiment Classification[C]// Association for Computational Linguistics. Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, September 17-21, 2015, Lisbon, Portugal. Stroudsburg PA: Association for Computational Linguistics, 2015: 1422-1432. |
[5] | YANG Z, YANG D, DYER C, et al.Hierarchical Attention Networks for Document Classification[C]// Association for Computational Linguistics. Proceedings of the 2016 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, June 12-17, 2016, San Diego, California. Stroudsburg PA: Association for Computational Linguistics, 2016: 1480-1489. |
[6] | YANG Dong, WANG Yizhi.An Attention-based C-GRU Neural Network for Text Classification[J]. Computer and Modernization, 2018, 34(2): 96-100. |
杨东,王移芝.基于Attention-based C-GRU神经网络的文本分类[J]. 计算机与现代化,2018,34(2):96-100. | |
[7] | JIANG Dapeng.Research on Short Text Classification Based on Word Distributed Representation[D]. Hangzhou: Zhejiang University, 2015. |
江大鹏. 基于词向量的短文本分类方法研究[D].杭州:浙江大学,2015. | |
[8] | WANG Wei, SUN Yuxia, QI Qingjie, et al.Text Sentiment Classification Model Based on BiGRU-Attention Neural Network[J]. Application Research of Computers, 2018, 36(12): 1-10. |
王伟,孙玉霞,齐庆杰,等.基于BiGRU-Attention神经网络的文本情感分类模型[J].计算机应用研究,2018,36(12):1-10. | |
[9] | BENGIO Y, DUCHARME R, VINCENT P, et al.A Neural Probabilistic Language Model[J]. Journal of Machine Learning Research, 2003, 3(1): 1137-1155. |
[10] | MIKOLOV T, CHEN K, CORRADO G, et al.Efficient Estimation of Word Representations in Vector Space[J]. Computer Science, 2013(1):28-36. |
[11] | PENNINGTON J, SOCHER R, MANNING C.Glove: Global Vectors for Word Representation[C]//Association for Computational Linguistics. Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing(EMNLP), October 25-29, 2014, Doha, Qatar. Stroudsburg, PA: 2014: 1532-1543. |
[12] | SIKDAR U K, BARIK B, GAMBÄCK B. Flytxt_NTNU at SemEval-2018 Task 8: Identifying and Classifying Malware Text Using Conditional Random Fields and Naive Bayes Classifiers[C]//Association for Computational Linguistics. Proceedings of The 12th International Workshop on Semantic Evaluation, June 5-6, 2018, New Orleans, Louisiana. Stroudsburg, PA: Association for Computational Linguistics, 2018: 890-893. |
[13] | LOYOLA P, GAJANANAN K, WATANABE Y, et al.Villani at SemEval-2018 Task 8: Semantic Extraction from Cybersecurity Reports using Representation Learning[C]//Association for Computational Linguistics. Proceedings of The 12th International Workshop on Semantic Evaluation, June 5-6, 2018, New Orleans, Louisiana. Stroudsburg, PA: Association for Computational Linguistics, 2018: 885-889. |
[14] | PETERS M E, NEUMANN M, IYYER M, et al.Deep Contextualized Word Representations[C]// Association for Computational Linguistics. Proceedings of the 2018 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, June 1-6, 2018, New Orleans, Louisiana. Stroudsburg, PA: Association for Computational Linguistics, 2018: 2227-2237. |
[15] | RADFORD A, NARASIMHAN K, SALIMANS T, et al. Improving Language Understanding by Generative Pre-training[EB/OL]. , 2018-11-5. |
[16] | DEVLIN J, CHANG M W, LEE K, et al.Bert: Pre-training of Deep Bidirectional Transformers for Language Understanding[C]// Association for Computational Linguistics. Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, June 2-7, 2019, Minneapolis, Minnesota. Stroudsburg, PA: Association for Computational Linguistics, 2019: 4171-4186. |
[17] | BRIDGES R A, JONES C L, IANNACONE M D, Testa, et al. Automatic Labeling for Entity Extraction in Cyber Security[EB/OL]. , 2018-11-5. |
[18] | PHANDI P, SILVA A, LU W.Semeval-2018 Task 8: Semantic Extraction from Cybersec Urity Reports Using Natural Language Processing(SecureNLP)[C]//Association for Computational Linguistics. Proceedings of The 12th International Workshop on Semantic Evaluation, June 5-6, 2018, New Orleans, Louisiana. Stroudsburg, PA: Association for Computational Linguistics, 2018: 697-706. |
[19] | MA C, ZHENG H, XIE P, et al.DM_NLP at SemEval-2018 Task 8: Neural Sequence Labeling with Linguistic Features[C]//Association for Computational Linguistics. Proceedings of The 12th International Workshop on Semantic Evaluation, June 5-6, 2018, New Orleans, Louisiana. Stroudsburg, PA: Association for Computational Linguistics, 2018: 707-711. |
[1] | Liuyang HOU, Senlin LUO, Limin PAN, Ji ZHANG. Multi-feature Android Malware Detection Method [J]. Netinfo Security, 2020, 20(1): 67-74. |
[2] | SONG Xin, ZHAO Kai, ZHANG Linlin, FANG Wenbo. Research on Android Malware Detection Based on Random Forest [J]. Netinfo Security, 2019, 19(9): 1-5. |
[3] | QIAO Yanchen, JIANG Qingshan, GU Liang, WU Xiaoming. Malware Classification Method Based on Word Vector of Assembly Instruction and CNN [J]. 信息网络安全, 2019, 19(4): 20-28. |
[4] | Jian ZHANG, Bohan CHEN, Liangyi GONG, Zhaojun GU. Research on Malware Detection Technology Based on Image Analysis [J]. Netinfo Security, 2019, 19(10): 24-31. |
[5] | LI Yunchun, LU Wentao, LI Wei. Malware Detection Method Based on Shapelet [J]. 信息网络安全, 2018, 18(3): 70-77. |
[6] | REN Hao, LUO Senlin, PAN Limin, GAO Junfeng. Research on the Algorithm of Short Text Representation Based on Graph Structure [J]. 信息网络安全, 2017, 17(3): 46-52. |
[7] | GUL Khan Safi Qamas, YIN Jize, PAN Limin, LUO Senlin. Research on the Algorithm of Named Entity Recognition Based on Deep Neural Network [J]. 信息网络安全, 2017, 17(10): 29-35. |
[8] | ZHANG Qian, GAO Zhangmin, LIU Jiayong. Research of Weibo Short Text Classification Based on Word2vec [J]. 信息网络安全, 2017, 17(1): 57-62. |
[9] | WANG Yi, TANG Yong, LU Zexin, YU Xin. Research on Features Selection in Malware Clustering [J]. 信息网络安全, 2016, 16(9): 64-68. |
[10] | ZHANG Jian, WANG Wenxu, NIU Pengfei, GU Zhaojun. Research on Test Evaluation System of Anti-malware Products and Service [J]. 信息网络安全, 2016, 16(9): 113-117. |
[11] | CAI Lin, CHEN Tieming. Research Review and Outlook on Android Mobile Malware Detection [J]. 信息网络安全, 2016, 16(9): 218-222. |
[12] | SHANG Hai, LUO Senlin, HAN Lei, ZHANG Ji. Research on Short Text Representation Based on Sentential Semantic Components [J]. 信息网络安全, 2016, 16(5): 64-70. |
[13] | DING Yong, CAO Wei, LUO Senlin. Research on the Technology of Malware Behavior Monitoring Based on LKM System Call Hijacking [J]. 信息网络安全, 2016, 16(4): 1-8. |
[14] | LIN Jiaping, LI Hui. Review of Android Malware Detection [J]. 信息网络安全, 2016, 16(10): 80-88. |
[15] | ZHENG Shengjun, GUO Longhua, CHEN Jian, NAN Shujun. An Online Detection System for Advanced Malware Based on Virtual Execution Technology [J]. 信息网络安全, 2016, 16(1): 29-33. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||