期刊文献+

改进的进程行为检测模型及实现 被引量:5

Improved model of process behavior detection and implementation
下载PDF
导出
摘要 为了检测恶意程序,分析了现有各类检测机制的不足,重新界定了进程行为概念的外延,提出了差量对比与进程动态行为分析的检测模型,给出了关键技术和实现方法。测试结果表明该检测模型在通用性和有效性方面优于传统检测方法。 To detect malicious program, the disadvantages of current detection mechanism were analyzed. The extension of process behavior concept was redefined. A detection model of difference comparison and process dynamic behavior analysis was proposed. The critical technology and realization were given. The experimental results indicate that the detection model excels traditional detection method in versatility and effectiveness.
出处 《计算机应用》 CSCD 北大核心 2010年第1期207-209,223,共4页 journal of Computer Applications
基金 四川省应用基础研究项目(07JY029-011)
关键词 恶意程序 差量对比 检测模型 API函数 vicious procedure difference comparison detection model API function
  • 相关文献

参考文献6

二级参考文献30

  • 1李焕洲,张健,陈麟.一种基于敏感信息跟踪的网络取证技术的研究[J].四川师范大学学报(自然科学版),2005,28(6):759-762. 被引量:2
  • 2国家计算机网络应急技术处理协调中心.CNCERT/CC2007年网络安全工作报告[EB/OL].http ://www. cert. org. cn/UserFiles/File/CNCERTCC2007 AnnualReport_Chinese. pdf,2007-08-21.
  • 3Fiskiran A M, Lee R B. Runtime execution monitoring (REM) to detect and prevent malicious code execution[ C]//Proceedings of the IEEE International Conference on Computer Design. Washington,DC, USA:IEEE Computer Society,2004:452-457.
  • 4Deng P S, Wang J H, Shieh W G, et al. Intelligent automatic malicious code signatures extraction [ C ]//Proceedings of IEEE 37th Annual 2003 International Carnahan Conference on Security Technology. Washington, DC, USA: IEEE Computer Society, 2003 : 600-603.
  • 5Schultz M G, Eskin E, Zadok E, et al. Data mining methods for detection of new malicious executables[ C]//Proceedings of the 2001 IEEE Symposium on Security and Privacy. Washington, DC, USA : IEEE Computer Society,2001:38.
  • 6梁晓 李毅超 崔甲等.基于系统调用挂钩的隐蔽木马程序检测方法.计算机工程,2007,33(20):181-183.
  • 7[1]API HOOKing Revealed.http://www.codeguru,com/ Cpp/W-P/system/misc/article.php/c5667,2006 (6).
  • 8[2]Yariv Kaplan.API Spying Techniques for Win-dows 9x,NT and 2000,http://www.internals.com/articles/apispy/apispy.htm,2006(6).
  • 9[3]Jeffrey Richter.Programming Applications for Microsoft Windows.USA:Microsoft Press,2000:515-564.
  • 10[4]Greg Hoglund,James Butler.Rootkits:Subverting the Windows Kernel.Addison Wesley Professional.2005.

共引文献31

同被引文献28

引证文献5

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部