期刊文献+

基于网络的恶意代码检测技术探析 被引量:2

Analysis of Network-based Malicious Code Detection Technology
下载PDF
导出
摘要 近几年,恶意代码侵袭网络范围不断扩大,对网络健康发展构成了巨大威胁,如何能有效消除恶意代码对网络的影响已成为社会关注焦点。恶意代码具有多变性和快速性,传统的基于特征的检测手段已经被淘汰,目前基于网络的恶意代码检测技术已经普遍运用,并且取得令人满意的成效。在对恶意代码种类分析的前提下,进一步探析了恶意代码检测技术的实施方法以及实施效果,希望能为网络减少恶意代码侵害起到积极的促进作用。 with the progress of the society and the development of science and technology development,we have gradually toward the Internet era,the malicious code is a common fault in the network technology.Malicious code attacks in recent years the network scope expands unceasingly,poses a great threat to healthy development of the network,how to effectively eliminate malicious code to the influence of the network has become a social focus.Malicious code with variability and quickness,the traditional detection methods based on feature has been eliminated,the malicious code detection based on network technology has been widely used,and achieved satisfactory results.Through analyzing the kinds of malicious code,in view of this further discusses the implementation methods and effects of the malicious code detection technology,hope to reduce the malicious code can network play a positive role.
作者 张显明
出处 《电脑开发与应用》 2013年第7期27-29,共3页 Computer Development & Applications
关键词 网络时代 恶意代码 检测技术 病毒 internet age malicious code detection technology virus
  • 相关文献

参考文献4

二级参考文献51

  • 1P Barford and M Blodgett. Toward Botnet Mesocosms[A]. In Proc. USENIX HotBots'07[C] .6 - 6.
  • 2J B Grizzard, V Sharma, C Nunnery, B B Kang and D Dagon. Peer-to-Peer Botnets: Overview and Case Study[A]. In Proc. USENIX HotBots' 07[ C]. 1-1.
  • 3P Wang, S Sparks and C Zou. An Advanced Hybrid Peer-to- Peer Botnet [ A]. In Proc. USENIX HotBots' 07 E C ]. 2 - 2.
  • 4R Vogt, J Aycock and M Jacobson. Army of Botnets[A]. In Proc. NDSS' 07 [ C]. 2007.111 - 123.
  • 5Y Pryadkin, R Lindell, J Bannister and R Govindan. An Empirical Evaluation of IP Address Space Occupancy [ R]. ISITR-2004 - 598,2004.
  • 6Z Chen and C Ji. Optimal worm-scanning method using vulnerable-host distributions[ J]. International Journal of Security and Networks, 2007,2(1/2) : 71 - 80.
  • 7Y Xie, F Yu, K Achan, E Gillum, M Goldszmidt and T Wobber. How Dynamic are IP Addresses? [ J]. Comput. Commun. Rev. ,2007,37(4) :301 - 312.
  • 8J B Horrigan and A Smith. Home Broadband Adoption 2007 [OL ]. http://www, pewintemet, org/pdfs/PIP_ Broadband 2007. pdf, 2007.
  • 9D Stutzbach and R Rejaie. Understanding churn in peer-to- peer networks [ A 3. In Proc. ACM IMC' 06 [ C ]. 2006. 189 - 202.
  • 10J M Kleinberg. Navigation in a small world[J ]. Nature, 2000, 406(6798) : 845.

共引文献24

同被引文献11

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部