Please wait a minute...
Computer & Telecommunication  2022, Vol. 1 Issue (1-2): 41-45    DOI: 10.15966/j.cnki.dnydx.2022.z1.010
Current Issue | Archive | Adv Search |
Research on Macro Virus Processing Model Based on SVM Algorithm
Nanjing University of Science and Technology Zijin College
Download:
Export: BibTeX | EndNote (RIS)      
Abstract  
The macro virus is a virus that exists in the Office document. Although the traditional anti-virus software can scan the existing macro viruses, there are still shortcomings in the new macro virus. By using the method of machine learning, a new macro feature selection method is proposed by comparing the characteristics of normal macro and harmful macro, and the SVM algorithm is
used to train the classification model. Combined with the classification model and the macro's own virus characteristics, we can
make a comprehensive judgment, so that we can predict the new macro categories. The experimental results show that the success rate can achieve 83.61% in this model.

Key words     
Published: 31 January 2022

Cite this article:

ZHANG Li.

Research on Macro Virus Processing Model Based on SVM Algorithm
. Computer & Telecommunication, 2022, 1(1-2): 41-45.

URL:

http://www.computertelecom.com.cn/EN/10.15966/j.cnki.dnydx.2022.z1.010     OR     http://www.computertelecom.com.cn/EN/Y2022/V1/I1-2/41

[1] LIU Hui-fang. Research and Application of Anti-fraud Model Based on Big Data of Communication Operator[J]. 电脑与电信, 2021, 1(7): 46-52.
[2] SHEN Ya-ting SHAO Ying BIAN Kai.
Summary of Research on Book Classification Model Technology in Smart Library
[J]. 电脑与电信, 2021, 1(12): 9-13.
[3] WANG Zhuang-zhuang LI Zhu. Improved Sobel Edge Detection Operator Based on Butterworth Filter[J]. 电脑与电信, 2020, 1(8): 19-22.
[4] WANG Yu HE Zhen-xiang. Research on the Intrusion Detection Method Based on Machine LearningAlgorithm[J]. 电脑与电信, 2020, 1(7): 1-3.
[5] JIANG Yi ZHU Jun-wu. Research on the Intrusion Detection Method Based on Machine LearningAlgorithm[J]. 电脑与电信, 2020, 1(7): 21-24.
[6] HUANG Jing YANG Shu-guo LIU Zi-zheng. AMethod for Image Retrieval with Capsule Network[J]. 电脑与电信, 2020, 1(6): 52-56.
[7] TONG Lian. Research and Application of Machine Learning in Big Data[J]. 电脑与电信, 2018, 1(9): 29-31.
[8] SONG Tian-shu, LI Jiang-yu, ZHANG Qin-zhe. Research on Personal Microblog Clustering Based on CBOW Model[J]. 电脑与电信, 2018, 1(4): 69-72.
[9] GONG Yong-gangWANG Xin-yuLI Yu-yingWANG Yun-qi. Research on Automatic Proofreading Method of Chinese Text Sensitive Information[J]. 电脑与电信, 2018, 1(12): 66-69.
[10] Wang Wang. Coverage Simulation of Base Stations Based on Machine Learning[J]. 电脑与电信, 2018, 1(11): 45-47.
[11] LIU Li-ping. An Anomaly Detection Algorithm Based on Artificial Immune Intelligence[J]. 电脑与电信, 2017, 1(12): 67-70.
[12] Chen Xiaomei. Feature Extraction Base onWavelet Modulus Maxima for Microarray Data[J]. 电脑与电信, 2016, 1(5): 46-48.
[13] Zhang Yixiang, Yang Tiebao. Research on the Failure Detection for DC/DC Converter Based on HMM[J]. 电脑与电信, 2015, 1(1-2): 63-66.
[14] Zeng Qingsong. An Action Recognition Method using Sequence Matching-based Embedding[J]. , 2011, 1(03): 0-0.
[15] Xu Lulei. Comparison of The two Methods of Sentiment Terms Identification on the Web[J]. , 2011, 1(01): 0-0.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd