Skip to main content

Using Fuzzy Pattern Recognition to Detect Unknown Malicious Executables Code

  • Conference paper
Fuzzy Systems and Knowledge Discovery (FSKD 2005)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3613))

Included in the following conference series:

Abstract

An intelligent detect system to recognition unknown computer virus is proposed. Using the method based on fuzzy pattern recognition algorithm, a malicious executable code detection network model is designed also. This model target at Win32 binary viruses on Intel IA32 architectures. It could detect known and unknown malicious code by analyzing their behavior. We gathered 423 benign and 209 malicious executable programs that are in the Windows Portable Executable (PE) format as dataset for experiment . After extracting the most relevant API calls as feature, the fuzzy pattern recognition algorithm to detect computer virus was evaluated.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 119.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. McGraw, G., Morisett, G.: Attacking malicious code: A report to the Infosec Research Council. IEEE Software 5, 33–41 (2000)

    Article  Google Scholar 

  2. Lo, R., Levitt, K., Olsson, R.: MCF: A malicious code filter. Computers & Security 14, 541–566 (1995)

    Article  Google Scholar 

  3. Tesauro, G., Kephart, J., Sorkin, G.: Neural networks for computer virus recognition. IEEE Expert 11, 5–6 (1996)

    Article  Google Scholar 

  4. Schultz, M., Eskin, E., Zadok, E., Stolfo, S.: Data mining methods for detection of new malicious executables. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 38–49. IEEE Press, Los Alamitos (2001)

    Google Scholar 

  5. Zhang, B., Yin, J., Zhang, D., Hao, J.: Unkown computer virus detection based on K-nearest neighbor algorithm. Computer Engineering and Applications 6, 7–10 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhang, B., Yin, J., Hao, J. (2005). Using Fuzzy Pattern Recognition to Detect Unknown Malicious Executables Code. In: Wang, L., Jin, Y. (eds) Fuzzy Systems and Knowledge Discovery. FSKD 2005. Lecture Notes in Computer Science(), vol 3613. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11539506_78

Download citation

  • DOI: https://doi.org/10.1007/11539506_78

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28312-6

  • Online ISBN: 978-3-540-31830-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics