• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Guo Fangfang, Wang Xinyue, Wang Huiqiang, Lü Hongwu, Hu Yibing, Wu Fang, Feng Guangsheng, Zhao Qian. A Dynamic Stain Analysis Method on Maximal Frequent Sub Graph Mining[J]. Journal of Computer Research and Development, 2020, 57(3): 631-638. DOI: 10.7544/issn1000-1239.2020.20180846
Citation: Guo Fangfang, Wang Xinyue, Wang Huiqiang, Lü Hongwu, Hu Yibing, Wu Fang, Feng Guangsheng, Zhao Qian. A Dynamic Stain Analysis Method on Maximal Frequent Sub Graph Mining[J]. Journal of Computer Research and Development, 2020, 57(3): 631-638. DOI: 10.7544/issn1000-1239.2020.20180846

A Dynamic Stain Analysis Method on Maximal Frequent Sub Graph Mining

Funds: This work was supported by the National Natural Science Foundation of China (61502118), the Natural Science Foundation of Heilongjiang Province of China (F2016028), the Fundamental Research Funds for the Central Universities (HEUCF180602, HEUCFM180604), and the Major National Science and Technology Program (2016ZX03001023-005).
More Information
  • Published Date: February 29, 2020
  • The malicious code recognition method on traditional dynamic stain analysis technology has many problems such as huge number of malicious code behavior dependency graphs (MBDG) and long time of matching process.According to the common characteristics of each malicious code family, the behavior dependency graph is represented by some common sub graph parts. Therefore, this paper proposes a malicious code behavior dependency graph mining method based on maximum frequent sub graphs. The method mines the largest frequent sub graphs which can represent the significant common features of the family from the malicious code family behavior dependency graph. The maximum frequent sub graph that is mined can represent the most significant common feature among the variants of this type of malicious code. The target behavior dependency graph just needs to be matched with the largest frequent sub graph after mining.Besides, the method reduces the number of behavior dependency graphs and improves the recognition efficiency without losing the characteristics of malicious code behavior. Compared with the traditional dynamic stain analysis method for malicious code recognition, when the minimum support is 0.045, the number of behavior dependency graphs decreases by 82%, the recognition efficiency increases by 81.7%, and the accuracy rate is 92.15%.
  • Related Articles

    [1]Liu Song, Wu Weiguo, Zhao Bo, Jiang Qing. Loop Tiling for Optimization of Locality and Parallelism[J]. Journal of Computer Research and Development, 2015, 52(5): 1160-1176. DOI: 10.7544/issn1000-1239.2015.20131387
    [2]Zhou Xu, Zhou Yantao, Ouyang Aijia, Li Kenli. An Efficient Tile Assembly Model for Maximum Clique Problem[J]. Journal of Computer Research and Development, 2014, 51(6): 1253-1262.
    [3]Li Kenli, Luo Xing, Wu Fan, Zhou Xu, and Huang Xin. An Algorithm in Tile Assembly Model for Maximum Clique Problem[J]. Journal of Computer Research and Development, 2013, 50(3): 666-675.
    [4]Zhou Xu, Li Kenli, Yue Guangxue, Yang Zhibang. A Volume Molecular Solution for the Maximum Matching Problem on DNA-Based Computing[J]. Journal of Computer Research and Development, 2011, 48(11): 2147-2154.
    [5]Li Kenli, Guo Li, Tang Zhuo, Jiang Yong, and Li Renfa. A Molecular Solution for the Ramsey Number on DNA-Based Supercomputing[J]. Journal of Computer Research and Development, 2011, 48(3): 447-454.
    [6]Xu Guang, An Hong, Xu Mu, Liu Gu, Yao Ping, Ren Yongqing, and Wang Fang. The Architecture and the Programming Model of a Data-Flow-Like Driven Tiled Stream Processor[J]. Journal of Computer Research and Development, 2010, 47(9): 1643-1653.
    [7]Li Kenli, Yao Fengjuan, Li Renfa, Xu Jin. Improved Molecular Solutions for the Knapsack Problem on DNA-Based Supercomputing[J]. Journal of Computer Research and Development, 2007, 44(6): 1063-1070.
    [8]Han Aili, Zhu Daming. DNA Computing Model Based on a New Scheme of Encoding Weight for Chinese Postman Problem[J]. Journal of Computer Research and Development, 2007, 44(6): 1053-1062.
    [9]Wang Lei, Lin Yaping, and Li Zhiyong. DNA Computation for a Category of Special Integer Planning Problem[J]. Journal of Computer Research and Development, 2005, 42(8): 1431-1437.
    [10]Chen Zhiping, Li Xiaolong, Wang Lei, Lin Yaping, and Cai Lijun. A Surface-Based DNA Algorithm for the Perfect Matching Problem[J]. Journal of Computer Research and Development, 2005, 42(7): 1241-1246.

Catalog

    Article views (1033) PDF downloads (232) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return