期刊文献+

基于SSDT HOOK的恶意软件主动防御系统的设计与实现 被引量:1

Design and Implementation of Malicious Software Active Defense System Based on SSDT HOOK
原文传递
导出
摘要 近年来,反恶意软件技术的研究主要禁锢于特征码扫描,很少对恶意软件主动防御技术进行深入的探讨和研究。该文基于SSDT HOOK技术,通过HOOK各个敏感Native API,实现了进程创建监控,驱动加载监控,远程线程监控,注册表访问监控,设计并完成了一个基于Windows平台的完备的恶意软件主动防御系统—SimpHips,经过测试,能够成功拦截大部分恶意软件的执行。 In recent years,anti -virus technology researching detain in signature scanning, and rarely take the initiative to conduct an in - depth research on the technology of active defense. This paper based on the SSDT HOOK technology,through HOOKing the various sensitive Native API ,implemented process creating monitoring, driver loading monitoring, remote thread monitoring, registry access monitoring, file ac- cess monitoring, designed and implemented a completed malicious software active defense system--SimpHips, tested and be able to successfully block the execution of most malicious software.
出处 《世界科技研究与发展》 CSCD 2010年第2期154-156,150,共4页 World Sci-Tech R&D
基金 铁道部科技计划项目(2008J002)
关键词 主动防御 HIPS SSDT HOOK 行为监控 active defense HIPS SSDT HOOK behavior monitoring
  • 相关文献

参考文献8

  • 1Rutkowski J K. Advanced Windows 2000 Rootkit Detection [ EB/ OL ]. http ://www. blackhat. com/presentations/bh - usa - 03/bhus - 03 - rutkowski/bh - us - 03 - rutkowski - paper. pdf,2009 - 02 - 01.
  • 2杨彦,黄皓.Windows Rootkit隐藏技术研究[J].计算机工程,2008,34(12):152-153. 被引量:14
  • 3阳道善,陈吉红.WinNT4.0内核驱动程序简析[J].计算机工程,1998,24(9):56-60. 被引量:2
  • 4Skoudis E,Zelter L.陈贵敏,译.决战恶意代码[M].电子工业出版社,2005,(4):23-30.
  • 5Greg Hoglund, James Butler. Rootkits : subverting the windows kernel [ M ]. Addison Wesley Professional, 2005:24 - 26.
  • 6Microsoft Corporation. Windows 2000 DDK Document [ M ]. 2000 : 31 -33.
  • 7offensiveMAL [ EB/OL ]. http ://www. offensivecomputing, net, 2009 -02 -05.
  • 8Sandhu R, Coyne EJ, Feinstein HL, Youman CE. Role-Based access control models [ J ]. IEEE Computer, 1996,29 (2) :38-47.

二级参考文献5

  • 1Hoglund G. The Definition of a Rootkit[DB/OL]. (2006-02-05). http://www.rootkit.com/blog.php?newsid=440.
  • 2Rutkowski J K. Advanced Windows 2000 Rootkit Detection[Z]. (2003-07-01). http://www.blackhat.com/presentations/bh-usa-03/bhus-03-rutkowski/bh-us-03-rutkowski-paper.pdf.
  • 3Butler J, Undercoffer J, Pinkston J. Hidden Processes: The Implication for Intrusion Detection[C]//Proc. of IEEE International Workshop on Information Assurance. New York, USA [s. n,], 2003,
  • 4Skoudis E,Zelter L.决战恶意代码[M].陈贵敏,译.北京:电子工业出版社,2005-04.
  • 5Ries C. Inside Windows Rootkits[Z]. (2006-05-01). http://www. vigilantminds.com/files/inside_windows_rootkits.pdf.

共引文献14

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部