期刊文献+

一种新的恶意代码检测方法 被引量:1

An New Method of Malicious Code Detection
下载PDF
导出
摘要 基于主机的检测系统对文件检测能力更强,但是因为开销,成本过高,因此实际中基于网络的检测系统应用场景更广泛,可以部署的节点更多,提升网络恶意代码检测系统的检测能力可以更有效地为之后的恶意代码防御做出支持。但是其节点设备数量虽然多,却相对低端,单台成本更低,不能像主机检测一样将捕捉到的网络数据包还原,即使可以,也费时费力,处理速度跟不上网络流量,将会造成大量的丢包。因此,如果能让检测系统的前端主机在能够不重组数据包就检测出数据包是否为恶意代码意义重大,在不还原数据包的情况下,通过对单包的内容进行检测从而对有问题的包产生告警信息,可以显著增强基于网络的恶意代码检测系统前端主机的检测能力,使其在病毒种植过程中就能探测到异常。 Although the HIDS has strong detection capability for documents, its cost of economy and system overhead are too high.Actualiy the NIDS' s application scenario is more widely, and more detecting nodes can be deployed, so that enhance detection capabilities of NIDS can support malicious code defense more effectively. However, the number of NIDS multi node devices is huge. but the devices are low-end relatively, lower unit costs, for these reasons the NIDS can not be the same as the HIDS to do the recombination for captured network packets . Even if you can, but also time-consuming, and processing speed can not keep up with network traffic speed. That will cause a lot of packets loss. So find a way to make the front end hosts in NIDS detect malicious code without doing data packets recombination is signality. In the case of not to restructuring the packets, through the way of detecting single packages' contents to find the questionable packages and produce alarm information, can significantly enhance the detection capacity of front end hosts in NIDS, and make the NIDS have the ability to detect abnormality in the process of viral transmission.
出处 《计算机安全》 2013年第9期14-18,共5页 Network & Computer Security
关键词 非包还原 检测 恶意代码 malicious code:virus detection without recombination
  • 相关文献

参考文献7

  • 1Ed Skoudis Lenny Zelter . Malware fightingmaliciouscode[M].陈贵敏,侯晓慧译.北京:电子工业出版社,2005:210.
  • 2McGrawG, MorisettG. Attackingmaliciouscode[M]. Areporttothe InfoseceseaPchCouncil, IEEESoftware, 2 0 0 0(5): 3 3-41.
  • 3吴冰,云晓春,高琪.基于网络的恶意代码检测技术[J].通信学报,2007,28(11):87-91. 被引量:8
  • 4Alis& Shevchenko, M&licious Code Detection Technologies, http ://www. k&spersky, corn, 2008.
  • 5Anderson d P.Compu%er Security Threat Monitoring and Surveillance[J]. James P Anderson Co, Fort Washington, Pennsylvania, 1980.
  • 6Kumar S.Classification arid Detection of Computer Intrusions[D]. Dissertation, Purdue University, 1995.
  • 7J.V.Lunteran. High performance pattern -matching for intrusion detection. In: 25th Conference of IEEE INFOCOM,Apr. 2006.

二级参考文献8

  • 1代六玲,黄河燕,陈肇雄.一种改进的多模式串匹配算法[J].模式识别与人工智能,2006,19(1):47-51. 被引量:4
  • 2GILDER G. Telecosm: How Infinite Bandwidth Will Revolutionize Our World[M]. The Free Press, New York, 2000
  • 3WEI S G, MIRKOVIC J. A realistic simulation of Internet-scale events[A]. Proceedings of the 1st Tnternafional Conference on Performance Evaluation Methodolgies and Tools Valuetools[C]. Italy, 2006.
  • 4AHO A V, CORASICK M J. Efficient string matching: an aid to bibliographic search[A]. Communications of the ACM 18[C]. 1975. 333- 340.
  • 5BOYER R S, MOORE J S. A fast string searching algorithm[A]. Communications of the ACM 20[C]. 1977. 762-772.
  • 6WU S, MANBER U. A Fast Algorithm For Multi-Pattern Searching[R]. Technical Report TR 94-17, University of Arizona at Tuscon, 1994.
  • 7YANG D H, XU K, CUI Y. An improved wu-manber multiple patterns matching algorithm[A]. Performance, Computing, and Communications Conference[C]. 2006.
  • 8张鑫,谭建龙,程学旗.一种改进的Wu-Manber多关键词匹配算法[J].计算机应用,2003,23(7):29-31. 被引量:27

共引文献7

同被引文献9

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部