JOURNAL ARTICLE

Malicious code detection model based on behavior association

Lansheng HanMengxiao QianXingbo XuCai FuHamza Kwisaba

Year: 2014 Journal:   Tsinghua Science & Technology Vol: 19 (5)Pages: 508-515   Publisher: Tsinghua University Press

Abstract

Malicious applications can be introduced to attack users and services so as to gain financial rewards, individuals' sensitive information, company and government intellectual property, and to gain remote control of systems. However, traditional methods of malicious code detection, such as signature detection, behavior detection, virtual machine detection, and heuristic detection, have various weaknesses which make them unreliable. This paper presents the existing technologies of malicious code detection and a malicious code detection model is proposed based on behavior association. The behavior points of malicious code are first extracted through API monitoring technology and integrated into the behavior; then a relation between behaviors is established according to data dependence. Next, a behavior association model is built up and a discrimination method is put forth using pushdown automation. Finally, the exact malicious code is taken as a sample to carry out an experiment on the behavior's capture, association, and discrimination, thus proving that the theoretical model is viable.

Keywords:
Computer science Code (set theory) Association (psychology) Relation (database) Heuristic Computer security Attack model Artificial intelligence Data mining Programming language

Metrics

7
Cited By
1.36
FWCI (Field Weighted Citation Impact)
15
Refs
0.83
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing
Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
Digital and Cyber Forensics
Physical Sciences →  Computer Science →  Information Systems

Related Documents

BOOK-CHAPTER

A Transformer-Based Malicious Code Detection Model

Yuerong LiYuntao Zhao

Lecture notes in electrical engineering Year: 2025 Pages: 105-112
BOOK-CHAPTER

Immunity-Based Model for Malicious Code Detection

Yu ZhangLihua WuFeng XiaXiaowen Liu

Lecture notes in computer science Year: 2010 Pages: 399-406
BOOK-CHAPTER

Malicious Code Detection Based on Generative Adversarial Model

Jin ZhangJia YangWeiqi Zhou

Lecture notes in computer science Year: 2025 Pages: 167-183
JOURNAL ARTICLE

Malicious code within model detection method based on model similarity

Degang WANG, Yi SUN, Chuanxin ZHOU, Qi GAO, Fan YANG

Journal:   DOAJ (DOAJ: Directory of Open Access Journals) Year: 2023
JOURNAL ARTICLE

Malicious code detection based on many‐objective transfer model

Binquan ZhangDi WuZhuoxuan LanZhihua CuiLiping Xie

Journal:   Concurrency and Computation Practice and Experience Year: 2023 Vol: 35 (22)
© 2026 ScienceGate Book Chapters — All rights reserved.