LI Peng and WANG Ruchuan, “Research of Malicious Code Attack Effect Based on Synthetic Entropy Method,” Chinese Journal of Electronics, vol. 22, no. 3, pp. 449-454, 2013,
Citation: LI Peng and WANG Ruchuan, “Research of Malicious Code Attack Effect Based on Synthetic Entropy Method,” Chinese Journal of Electronics, vol. 22, no. 3, pp. 449-454, 2013,

Research of Malicious Code Attack Effect Based on Synthetic Entropy Method

Funds:  This work is supported by the National Natural Science Foundation of China (No.61003236, No.60973139, No.61170065, No.61171053, No.61003039, No.61103195), the Natural Science Foundation of Jiangsu Province (No.BK2011755)
  • Received Date: 2012-02-01
  • Rev Recd Date: 2012-12-01
  • Publish Date: 2013-06-15
  • To resolve the problem of assessing the effect of a network attack, this paper combines cross entropy with network character entropy method and proposes scheme to evaluate the malicious code attack effect. It captures the related indicators in real time and normalizes the data so as to evaluate it at the same level. It adopts cross entropy method to pretreat the indicators adaptively. We calculate the weight coefficient and exploit network character entropy method to evaluate the attack with accuracy according to the importance of the indicators in the evaluation system. Experimental results and corresponding comparisons reveal that the proposed method can quantitatively determine the exact effect of the malicious code attack.
  • loading
  • LiuWeiwei, Shi Yong, Guo Yu, Han Zhen and Shen Changxiang, “A malicious code detection method based on integrated behavior characterization”, Electronica Sinica, Vo1.37, No.4, pp.696670, 2009. (in Chinese)
    S. Mannor, R. Rubinstein, Y. Gat, “The cross-entropy method for fast policy search”, Proc. of the Twentieth International Conference on Machine Learning (ICML-2003), Washington DC, USA, pp.512-519, 2003.
    M. Maher, L. Ronghui, D. Ngoduy, “Signal optimisation using the cross entropy method”, Transportation Research Part C: Emerging Technologies, Vol.19, No.6, pp.1-13, 2011.
    S.L. Ho, Yang Shiyou, “The cross-entropy method and its application to inverse problems”, IEEE Transactions on Magnetics, Vol.46, No.8, pp.3401-3404, 2010.
    Zhou Hong, Qiu Yue, “Application research on corporate default risk assessment based on cross-entropy algorithm”, Computer Engineering and Applications, Vol.44, No.20, pp.13-16, 2008. (in Chinese)
    M. Celenkx, T. Conley, J. Willis and J. Graham, “Anomaly detection and visualization using Fisher discriminant clustering of network entropy”, Proc. of IEEE Third Int. Conf. Digital Information Management (ICDIM 2008), Aracaju, SE, Brazil, pp.216-220, 2008.
    L. Ji, W. Binghong, W. Wenxu and Z. Tao, “Network entropy based on topology configuration and its computation to random networks”, Chinese Physics Letters, Vol.25, No.11, pp.41774180, 2008.
    Wang Yi, Hu Hanping, Wang Zuxi and Chen Jianghang, “Measurement model for network security based on traffic attack determination”, Journal of Huazhong University of Science and Technology (Nature Science Edition), Vol.36, No.4, pp.37-40, 2008. (in Chinese)
    Zhang Yirong, Xian Ming, Zhao Zhichao, Xiao Shunping and Wang Guoyu, “A study on the evaluation technology of the attack effect of computer networks”, Journal of National University of Defense Technology, Vol.24, No.5, pp.24-28, 2002. (in Chinese)
    S.J. Hwang, K.H. Chen, “A proxy automatic signature scheme using a compiler in distributed systems for (unknown) virus detection”, Proc. of the 19th International Conference on Advanced Information Networking and Applications (AINA'05), Taipei, China. Piscataway, NJ, USA, pp.649-654, 2005.
    W. Jauhwang, S. Peter, F. Yishen, J. Lijing and L. Yuching, “Virus detection using data mining techinques”, Proc. of IEEE Annual International Carnahan Conference on Security Technology, Taiwan, China, pp.71-76, 14-16 Oct. 2003.
    Li Peng, Wang Ruchuan, Gao Dehua, “Research on rootkit dynamic detection based on Fuzzy pattern recognition and support virtual machine technology”, Electronica Sinica, Vol.40, No.1, pp.115-120, 2012. (in Chinese)
    P. Boer, D. Kroese, S. Mannor and R. Rubinstein, “A tutorial on the cross-entropy method”, Annals of Operation Research, Vol.134, No.1, pp.19-67, 2005.
    P. Kroese, Y. Rubinstein, T. Taimre, “Application of the crossentropy method to clustering and vector quantization”, Journal of Global Optimization, Vol.37, No.1, pp.137-157, 2007.
    C. Rao, “Entropy and cross entropy: Characterizations and applications”, The Legacy of Alladi Ramakrishnan in the Mathematical Sciences, Vol.3, No.1, pp.359-367, 2010.
    Q. Qian, Che Hongyi, Z. Rui, “Entropy based method for network anomaly detection”, 15th IEEE Pacific Rim International Symposium on Dependable Computing, Shanghai, China, pp.189-191, 2009.
    J. Riihijarvi, M. Wellens, P. Mahonen, “Measuring complexity and predictability in networks with multiscale entropy analysis”, Proc. of IEEE INFOCOM, April 19-25, pp.1107-1115, 2009.
    C. Cowan, P. Wagle, C. Pu, S. Beattie and J. Walpole, “Buffer overflows: Attacks and defenses for the vulnerability of the decade”, Proc. of the Foundations of Intrusion Tolerant Systems (OASIS'03), Farafra Oasis, Egypt, pp.227-237, 2003.
    S. McClure, J. Scambray, G. Kurtz, “Hacking Exposed: Network Security Secrets and Solutions”, Fourth Edition, McGrawHill Osborne Media, pp.533-556, 2003.
    A. Costa, D. Jones, D. Kroese, “Convergence properties of the cross-entropy method for discrete optimization”, Operations Research Letters, Vol.35, No.5, pp.573-580, 2007.
    M. Markou, S. Singh, “Novelty detection: a review part 2: neural network based approaches”, Signal Processing, Vol.83, No.12, pp.2499-2521, 2003.
    A. Mohamed, Mahfouz, M. Ismail, “Fuzzy relatives of the CLARANS algorithm with application to text clustering”, Proc. of World Academy of Science, Engineering and Technology, France, pp.334-341, 2009.
  • 加载中


    通讯作者: 陈斌,
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (757) PDF downloads(1409) Cited by()
    Proportional views


    DownLoad:  Full-Size Img  PowerPoint