期刊文献+

基于病毒行为序列的未知病毒分析技术研究 被引量:2

Unknown Computer Virus Detection Based on Its Behavior Sequence
下载PDF
导出
摘要 提出了一种在虚拟执行技术支持下基于病毒行为序列的未知病毒分析检测技术。该技术可以克服病毒特征代码扫描法不能识别未知病毒的特点。在模拟的虚拟执行环境中对该方法进行了测试,测试表明了该方法的可行性和较高的准确性。 A algorithm to detect and analyze computer virus based on its behavior sequence under the support of virtual execution technology is presented in this paper.It can overcome the shortage of normal virus scanner,which could not detect unknown virus.Tests in a simulating virtual execution environment indicated that this algorithm is feasible and accurate.
出处 《计算机安全》 2010年第5期4-5,共2页 Network & Computer Security
关键词 计算机病毒 虚拟执行 行为序列 病毒检测 Computer virus Virtual execution Behavior sequence Virus detection
  • 相关文献

参考文献9

  • 1张波云,殷建平,蒿敬波,张鼎兴.基于多重朴素贝叶斯算法的未知病毒检测[J].计算机工程,2006,32(10):18-21. 被引量:22
  • 2C Nachenberg.Computer virus-coevolution.Communications of the ACM,1997/Vol.40.NO.I.
  • 3O Henchiri,N Japkowicz.A feature selection and evaluation scheme for computer virus detection,IEEE International Conference on Data Mining (ICDM),2006.
  • 4M Christodorescu,S Jha.Static analysis of executables to detect malicious patterns.Proceedings of the 12th conference on USENIX Security Symposium-Volume12,2003.
  • 5T Li,X Liu,H Li.An immune-based model for computer virus detection.Lecture Notes in Computer Science,Volume 3810/2005,p59-71 2005.
  • 6Takeshi Okamoto,Yoshiteru Ishida.A Distributed Approach to Computer Virus Detection and Neutralization by Autonomous and Heterogeneous Agents,pp.328,The Fourth International Symposium on Autonomous Decentralized Systems,1999.
  • 7解析虚拟机杀毒技术,http://litiejun.blog.51cto.com/134711/21875.2009-2-1.
  • 8瑞星2008主动防御技术特点和分析详解http://soft.ccw.com.cn/news/htm2007/20070815-302685.shtml,2009-2-24.
  • 9揭秘"主动防御"技术,http://www.cnw.com.cn/weekly/htm2006/20060628-47161.shtml,2009-2-24.

二级参考文献8

  • 1张波云,殷建平,张鼎兴,嵩敬波.基于K-最近邻算法的未知病毒检测[J].计算机工程与应用,2005,41(6):7-10. 被引量:15
  • 2Cohen F.Computer Viruses:Theory and Experiments[J].Computers & Security,1987,6(1):22-35.
  • 3Spinellis D.Reliable Identification of Bounded-length Viruses is NP-Complete[J].IEEE Transactions on Information Theory,2003,49(1):280-284.
  • 4Tesauro G J,Kephart J O,Sorkin G B.Neural Networks for Computer Virus Recognition[J].IEEE Expert,1996,11(4):5-6.
  • 5Mitchell T M.Machine Learning[M].New York:McGraw-Hill,1997.
  • 6Lo R,Levitt K,Olssonn R.MFC:A Malicious Code Filter[J].Computer & Security,1995,14 (6):541-566.
  • 7Kruglinski D J,Wingo S,Shepherd G.Programming Visual C++[M].Washington:Microsoft Press,1998.
  • 8祝恩,殷建平,蔡志平,赵建民.计算机病毒自动变形机理的分析[J].计算机工程与科学,2002,24(6):14-17. 被引量:17

共引文献21

同被引文献12

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部