期刊文献+

基于因果关联分析恶意代码检测的研究与应用 被引量:1

Based on Causality Analysis of Malicious Code Detection Research and Application
下载PDF
导出
摘要 文章针对恶意代码的攻击原理,介绍了对恶意代码的检测。通过因果关联的分析原理检测恶意代码,提高对恶意代码等网络攻击的安全防范意识,更新操作系统发布的最新安全漏洞补丁,修补操作系统安全漏洞;加强网络共享管理;强化密码设置,增强安全策略,加强密码强度。 Aims at the pdnciple of malicious code attack we introduce the malicious code detection. Based on the causal association analysis to test the malicious code can improve the security awareness. We need to update new security hole patch, modify the system security flaw, increase the network sharing management, intensify the password setting, develop the security policy, and strengthen the password strength.
作者 李振美
出处 《信息安全与技术》 2014年第1期45-47,共3页
关键词 因果关联 恶意代码 检测 causal association malicious code detection
  • 相关文献

参考文献3

二级参考文献19

  • 1文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187
  • 2WildList Organization International. Wild list[EB/OL]. (2006-08-27) [ 2006-11-10 ]. http://www, wildlist, org.
  • 3Peter Szor. The art of computer virus research and defense[M]. 1st ed, NJ: Addison Wesley Professional, 2005: 321-327.
  • 4JIANG Xuxian, XU Dongyan. Profiling self-propagating worms via behavioral footprinting[ C ]// ACM Workshop On Recurring Malcode(WORM). New York: ACM Press, 2006:17-24.
  • 5SINGH S, ESTAN C, VARGHESE G, et al. The earlybird system for real-time detection of unknown worms: Technical report CS2003-0761[R]. San Diego: UCSD,2003.
  • 6Newsome James, Karp Brad Song Dawn. Polygraph: Automatically generating signatures for polymorphic worms [ C]// IEEE Symposium on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 2005:226-241.
  • 7CHRISTODORESCU M, JHA S. Static analysis of executables to detect malicious patterns[ C/OL]. The 12th USENIX Security Symposium, (2005-10-12) [2007-04-21]. http://www. cs. cornell. edu/courses/cs711/2005fa/papers/cj-usenix03.pdf.
  • 8XU JY, SUNG AH, CHAVEZ P, et al. Polymorphic malicious executable scanner by API sequence analysis [C]// Fourth International Conference on Hybrid Intelligent Systems. Los Alamitos: IEEE Computer Society Press, 2004: 378-383.
  • 9Symantec. Sasser[EB/OL]. (2004-05-11)[2007-04-15]. http://www. microsoft, com/security/incidenl/sasser, asp.
  • 10JIANG X, XU D, WANG H J, et al. Virtual playgrounds for worm behavior investigation[ C]// International Symposium on Recent Advances in Intrusion Detection(RAID), Germany:Springer, 2005 :1-21.

共引文献6

同被引文献9

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部