A Malicious Mining Code Detection Method Based on Multi-Features Fusion
Author | Li, Shudong |
Author | Jiang, Laiyuan |
Author | Zhang, Qianqing |
Author | Wang, Zhen |
Author | Tian, Zhihong |
Author | Guizani, Mohsen |
Available date | 2022-10-20T07:46:13Z |
Publication Date | 2022-01-01 |
Publication Name | IEEE Transactions on Network Science and Engineering |
Identifier | http://dx.doi.org/10.1109/TNSE.2022.3155187 |
Citation | Li, S., Jiang, L., Zhang, Q., Wang, Z., Tian, Z., & Guizani, M. (2022). A Malicious Mining Code Detection Method Based on Multi-Features Fusion. IEEE Transactions on Network Science and Engineering. |
Abstract | With the continuous increase in the economic value of new digital currencies represented by Bitcoin, more and more cybercriminals use malicious code to occupy victims system resources and network resources for mining without the victims permission, thereby obtaining cryptocurrency. This type of malicious code named malicious mining code has brought considerable influence and harm to society, enterprises and users. The mining code always conceals the fact that it consumes computer resources in a way that is difficult for ordinary people to discover. This paper proposes a malicious mining code detection method based on feature fusion and machine learning. First, we analyze from static analysis methods and statistical analysis methods to extract multi-dimensional features. Then for multi-dimensional text features, feature vectors are extracted through the n-gram model and TF-IDF, and best feature vectors are selected through the classifier and we fuse these best feature vectors with other statistic features to train our detection model. Finally, automatic detection is performed based on the machine learning framework. The experimental results show that the recognition accuracy of our method can reach 98.0%, its f1 score reach 0.969, and the ROCs AUC reach 0.973. |
Language | en |
Publisher | IEEE Computer Society |
Subject | Analytical models Codes Feature extraction feature fusion malicious mining code Malware Production static analysis statistics feature Terminology Training |
Type | Article |
Files in this item
Files | Size | Format | View |
---|---|---|---|
There are no files associated with this item. |
This item appears in the following Collection(s)
-
Computer Science & Engineering [2426 items ]