期刊文献+

自主式学习的木马检测预防系统的设计与实现

Design and Implementation of a Self-Learning Trojan Detection and Prevention System
下载PDF
导出
摘要 随着黑客攻击技术的不断进步,网络安全面临越来越严重的威胁。由于不能确保系统不被黑客攻击,也无法确定用户操作的文件或程序是否含有恶意的代码,因而,及时发现系统中存在的木马程序或者含有恶意代码的文件,是确保系统信息安全的重要途径。目前的许多木马检测软件仅能对已知的木马进行检测,对未知木马却无可奈何。文章在分析和综合当前木马检测技术的基础上,设计并实现了一个在Windows系统中行之有效的木马检测系统,不仅能有效检测已知的木马,还能对未知的木马进行有效的预防,通过对未知木马的特征进行自主式学习,并应用于检测,从而提高木马检测的功能。 As the attacking technology is developing,the security of networks is faced with more and more severe challenge and it is not sure that the operating file or running program has malicious code.How to find and remove the Trojan program is very important to ensure the information security,but many software just can detect known Trojan horse.From analysis and inducement of the current Trojan horse detection technologies,this paper designs and implements a very efficient Trojan horse detection system based on Windows to detect known Trojan horse and learn from preventing unknown Trojan horse to enhance the detection ability.
出处 《计算机工程与应用》 CSCD 北大核心 2005年第25期141-144,共4页 Computer Engineering and Applications
基金 重庆市教委科学技术研究项目(编号:050302)
关键词 木马 检测 预防 自主式学习 Trojan horse,detection,prevention,self-learning
  • 相关文献

参考文献10

  • 1Beyah R A,Holloway M C,Copeland J A.Invisible Trojan:an architecture,implementation and detection method[C].In:Circuits and Systems.MWSCAS-2002,The 2002 45th Midwest Symposium,2002-Ⅲ-500~Ⅲ-504.
  • 2M Debbabi,M Girard,L Poulin et al.Dynamic Monitoring of Malicious Activity in Software[C].In:Systems;As accepted in Symposium on Requirements Engineering for Information Security(SREIS'01 ), Indianapolis, Indiana, USA, 2001-03.
  • 3J Bergeron,M Debbabi,J Desharnais et al.Static Detection of Malicious Code in Executable Programs[C].In:As accepted in Symposium on Requirements Engineering for Information Secufity(SREIS'01),to be published in a special issue of Requirements Engineering Journal, Indianaoolis. Indiana, USA, 2001-03.
  • 4M Salois,R Charpentier.Dynamic Detection of Malicious Code in COTS Sofware[C].In:Commercial Off-The-Shelf Products in Defence Applications "The Ruthless Pursuit of COTS",Neuilly-sur-Seine Codex, France, NATO, RTO, 2000-04.
  • 5Weber M,Schmid M,Schatz et al.A toolkit for detecting and analyzing malicious software[C].In:Computer Security Applications Conference,Proceedings 18th Annual,2002:423-431.
  • 6Cunningham R K,Lippmann R P,Webster S E.Detecting and displaying novel computer attacks with Macroscope Systems[C].In:Man and Cybernetics, Part A, IEEE Transactions on, 2001 ; 31 (4) : 275 -281.
  • 7Proctor N ,Wong R.The security policy of the secure distributed operating system prototype[C].In:Computer Security Applications Conference,Fifth Annual, 1999:95-102.
  • 8Trostle J T.Timing attacks against trusted path.Security and Privacy [J].Proceedings 1998 IEEE Symposium, 1998:125-134.
  • 9Wiseman S,Terry P,Wood A et al.The trusted path between SMITE and the user.Security and Privacy.Proceedings 1988 IEEE Symposium, 1988 : 146- 155.
  • 10Lo R,Kerchen P,Crawford R et al.Towards a testbed for malicious code detection[C].In :Compcon Spring’91 ,Digest of Papers, 1991 : 160-166.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部