期刊文献+

未知病毒的行为分析和防御 被引量:2

Methods of behavior analyzing and system recovery on unknown computer viruses
下载PDF
导出
摘要 目前大多数反病毒软件只删除病毒文件,不能恢复受损的系统配置.分析病毒行为可以更精确地得出病毒的工作机理,是修复受损系统的重要途径.该文研究病毒和蠕虫在操作系统中的感染特征,得出了检测和防御未知病毒的普遍、快速而有效的方法.提出清除新病毒的行为逆转(BRB)模型,这种模型可通过分析病毒行为自动修复未知病毒对系统的损坏. This paper presents how viruses reside and execute on Windows operating systems. Most of current anti-virus software which rely on virus character analysis can be cheated by modifying the virus's relative code. They cannot recover system configurations after virus infection, too. To resolve this problem, a general and effective method was proposed to manually detect and clear the virus, which is the only way to repair the system in some eases. The behavior rolling back(BRB) mode can recover the systems after viruses infection by analyzing the behavior of the unknown viruses.
出处 《广州大学学报(自然科学版)》 CAS 2006年第1期32-36,共5页 Journal of Guangzhou University:Natural Science Edition
关键词 计算机病毒 手工杀毒 自动加我 蠕虫 入侵检测 cornputer virus rootkit atitorun worm IDS
  • 相关文献

参考文献6

  • 1Christa Anderson. Mastering Windows Server, 2003 [M]. Sybex Press,2004.
  • 2Microsoft Security Bulletin MS04-028. Buffer Overnm in JPEG Processing ( GDI + ) Could Allow Code Execution[EB/OL]. blip ://www. mierosoft, com/technet/security/bulletin/ms04-028, mspx ,2004-03.
  • 3David A Solomon, Mark E Russinovich. Inside Microsoft. Windows 2000[M]. Third Edition. Microsoft Press,2000.
  • 4Prentice ttall. (Windows) System and startup settings [ EB/OL ]. http://www. microsoft.com/technet/prodtechnol/windows2OOOserv/maintain/featusability/systeman, mspx, 2001-06.
  • 5Clark J, Security accounts manager[EB/OL]. http ://www. beginningtoseethelight. org/ntsecurity/index. php, 2005-04.
  • 6Jan Krzysztof Rutkowski. Advanced Windows 2000 rootkit deteetion (execution path analysis) [R]. HiverCon 2003 July,2003 : 11-12.

同被引文献7

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部