{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T11:46:56Z","timestamp":1693309616065},"reference-count":20,"publisher":"Wiley","issue":"6","license":[{"start":{"date-parts":[[2021,7,18]],"date-time":"2021-07-18T00:00:00Z","timestamp":1626566400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Security and Privacy"],"published-print":{"date-parts":[[2021,11]]},"abstract":"Abstract<\/jats:title>The spread of network viruses has posed a serious threat to the security of the network; therefore, it is necessary to detect and defend them effectively. This paper used debugging application programming interface (API) technology to obtain the features of API calls as viruses, filtered API calls according to information entropy, and finally used the support vector machine (SVM) model for virus detection. The experimental results showed that when the number of API was 1200, the algorithm had the best virus detection performance, with an average true positive rate (TPR) of 95.2%, a false positive rate (FPR) of 3.31%, and an overall accuracy of 95.42%; compared with the C4.5 algorithm, the K\u2010means algorithm, and the Naive Bayes algorithm, the SVM algorithm had the best performance. The results show that the proposed method is effective in virus detection and defense and can be further promoted and applied in practice.<\/jats:p>","DOI":"10.1002\/spy2.179","type":"journal-article","created":{"date-parts":[[2021,7,19]],"date-time":"2021-07-19T01:58:57Z","timestamp":1626659937000},"update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Detection and defense of network virus using data mining technology"],"prefix":"10.1002","volume":"4","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-8487-0403","authenticated-orcid":false,"given":"Zhijun","family":"Li","sequence":"first","affiliation":[{"name":"Integrated Business Department of Assets and Laboratory Management Center Hebei Normal University for Nationalities Chengde Hebei China"}]},{"given":"Xuedong","family":"Jiang","sequence":"additional","affiliation":[{"name":"Information Center Hebei Normal University for Nationalities Chengde Hebei China"}]}],"member":"311","published-online":{"date-parts":[[2021,7,18]]},"reference":[{"issue":"5","key":"e_1_2_8_2_1","first-page":"052065 (7 pp)","article-title":"Research on the main threat and prevention technology of computer network security","volume":"632","author":"Gao X","year":"2021","journal-title":"IOP Conf Ser Earth Environ Sci"},{"key":"e_1_2_8_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2017.01.290"},{"key":"e_1_2_8_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2017.2705807"},{"issue":"11","key":"e_1_2_8_5_1","first-page":"429","article-title":"Research on Hadoop identity authentication based on improved Kerberos protocol","volume":"9","author":"Hu DD","year":"2015","journal-title":"Int J Secur Its Appl"},{"key":"e_1_2_8_6_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-015-0013-4"},{"key":"e_1_2_8_7_1","doi-asserted-by":"publisher","DOI":"10.4028\/www.scientific.net\/AMM.738-739.1197"},{"issue":"4","key":"e_1_2_8_8_1","first-page":"805","article-title":"Defense of computer network viruses based on data mining technology","volume":"20","author":"Zuo C","year":"2018","journal-title":"Int J Netw Secur"},{"key":"e_1_2_8_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/NICS.2016.7725670"},{"key":"e_1_2_8_10_1","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1007\/978-3-319-17996-4_14","article-title":"A new method of virus detection based on maximum entropy model","volume":"358","author":"Nguyen NT","year":"2015","journal-title":"Adv Intell Syst Comput"},{"key":"e_1_2_8_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07674-4_69"},{"key":"e_1_2_8_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101743"},{"key":"e_1_2_8_13_1","doi-asserted-by":"publisher","DOI":"10.33581\/2520-6508-2020-1-59-69"},{"key":"e_1_2_8_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19578-0_34"},{"key":"e_1_2_8_15_1","first-page":"63","article-title":"Detecting DOM\u2010based XSS vulnerabilities using debug API of the modern web\u2010browser","volume":"35","author":"Sigalov DA","year":"2017","journal-title":"Prikl Diskr Mat"},{"key":"e_1_2_8_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2019.04.011"},{"key":"e_1_2_8_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2012.2190816"},{"key":"e_1_2_8_18_1","doi-asserted-by":"publisher","DOI":"10.19026\/ajfst.11.2793"},{"key":"e_1_2_8_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106784"},{"key":"e_1_2_8_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cogsys.2019.03.007"},{"key":"e_1_2_8_21_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1228"}],"container-title":["SECURITY AND PRIVACY"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/spy2.179","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/spy2.179","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/spy2.179","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,28]],"date-time":"2023-08-28T03:36:10Z","timestamp":1693193770000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/spy2.179"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,18]]},"references-count":20,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2021,11]]}},"alternative-id":["10.1002\/spy2.179"],"URL":"https:\/\/doi.org\/10.1002\/spy2.179","archive":["Portico"],"relation":{},"ISSN":["2475-6725","2475-6725"],"issn-type":[{"value":"2475-6725","type":"print"},{"value":"2475-6725","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,7,18]]},"assertion":[{"value":"2021-05-08","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-06-23","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-07-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}