期刊文献+

基于可执行路径分析的隐藏进程检测方法 被引量:3

Method of Detecting Hidden Process Based on EPA
下载PDF
导出
摘要 研究了内核模式下进程隐藏的原理和进程隐藏检测技术。在此基础上,提出了一种Windows操作系统内核模式下基于可执行路径分析(EPA)的隐藏进程检测技术。通过检查某些关键系统函数执行时所用的指令个数,来判断这些函数是否执行了多余的代码,从而断定系统被Windows Rootkit修改过了。利用该方法,可以检测出当前常规安全检测工具不能发现的系统恶意程序的进程隐藏。 The principle of hidden process and its detecting technology in the kernel mode has been analyzed. Fur- thermore, a new method based on Execution Path Analysis technology in the kernel mode of Windows operation system is put forward. The method judges whether more instructions are executed by calculating the number of instructions during the executing process of the function. Then, it gives the conclusion that whether the system is modified by Windows Root- kit or not. The method can be explored for detecting the intrusions of Trojan horse which other detective software for se- curity can not find.
作者 韩芳
出处 《计算机与数字工程》 2009年第1期115-117,148,共4页 Computer & Digital Engineering
基金 2007年宜昌市重大科技项目(编号A2007107-05)资助:计算机病毒主动防范系统研究与实现
关键词 进程 隐藏 执行 路径 检测 process, hide, executive, path, detect
  • 相关文献

参考文献9

二级参考文献45

共引文献78

同被引文献22

  • 1王松涛,吴灏.Linux下基于可执行路径分析的内核rootkit检测技术研究[J].计算机工程与应用,2005,41(11):121-123. 被引量:8
  • 2易宇,金然.基于符号执行的内核级Rootkit静态检测[J].计算机工程与设计,2006,27(16):3064-3068. 被引量:11
  • 3郑光明,胡博.基于MD5的文件完整性检测软件设计[J].湖南理工学院学报(自然科学版),2007,20(1):35-38. 被引量:8
  • 4GREG H,JAMES B.subverting the windows kernel[M].USA:Addison Wesley Professional,2005.
  • 5南京傲屹电子有限公司.AT命令手册[EB/OL].[2010-08-07].http://cnaye.com/xiazai/AT.pdf.
  • 6linux_lyb.恢复工厂设置流程[EB/OL].(2009-11-07)[2010-08-08].http://blog.csdn.net/linux_lyb/archive/2009/11/07/4781939.aspx.
  • 7Samuel T King,Peter M Chen.SubVirt Implementing Malware With Virtual Machines[J].IEEE Symposium on Security and Privacy,2006:327-341.
  • 8Rajab M, Zarfoss J, Monrose F, et al. A multifaceted approach to understanding the botnet phenomenon [C] //Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, 2006: 25-27.
  • 9Gu G, Perdisei R, Zhang J, et al. Botminer: Clustering analysis of network traffic for protocol and structure-independent botnet detection [C]//17th USENIX Security Symposium, 2008: 139-154.
  • 10Reiter M K, Yen T-F. Traffic aggregation for malware detection [C] //The Fifth GI International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, 2008.

引证文献3

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部