期刊文献+

一种虚拟化恶意程序检测系统的实现

Realization of vicious procedures detection system based on virtual technology
下载PDF
导出
摘要 为了自动智能检测出新变种的恶意程序,使用虚拟执行与应用程序接口钩子技术,分析程序执行中调用的系统接口,将接口调用顺序编码形成一个特征序列。运用编辑距离算法计算程序特征序列与数据库中恶意特征序列的相似度,实现自动判别恶意种类的功能。在随机选取样本的的前提下,本系统对样本分析后结果表明,检测识别精确度达到92%,误报率仅为6%。 In order to automatically detect new varieties of malicious program efficiently,based on virtualization and API hook technology,analyzing the system interface call in program execution,a character sequence is formed from coding this process.The system then use Levenshtein Distance algorithm to determine the vicious procedures.System verification results from randomly selected samples show that the detection accuracy is reached a high recognition rate of 92%and low false alarm rate of 6%.
作者 吴晨 王雄
出处 《西安邮电大学学报》 2014年第2期77-81,共5页 Journal of Xi’an University of Posts and Telecommunications
基金 陕西省信息化建设重点基金资助项目(2011AQ01YA04-09)
关键词 接口钩子 虚拟化 恶意程序检测 编辑距离算法 API hook virtual malicious executables detection levenshtein distance
  • 相关文献

参考文献7

  • 1Miller F P, Vandome A F, McBrewster J. Levensh- rein Distanee[M]. 3rd ed. Mauritius; Alphaseript Publishing, 2009: 25-112.
  • 2Sehultz M G, Eskin E, Zadok E. Data Mining Meth- ods for Detection of New Malicious Executables[J]. IEEE Computer Society, 2001,12(3) ;38-49.
  • 3Abou-Assaleh T, Cereone N, Keselj V. N-Gram-Based De- tection of New Malicious Code[J]. Computer Software and Applications Conference, 2004,28(2) :41-42.
  • 4章文,郑烇,帅建梅,陈超.基于关联规则的未知恶意程序检测技术[J].计算机工程,2008,34(24):172-174. 被引量:3
  • 5张一弛,庞建民,赵荣彩.基于证据推理的程序恶意性判定方法[J].软件学报,2012,23(12):3149-3160. 被引量:7
  • 6张永超.基于虚拟执行技术的恶意程序检测系统研究与实现[D].长沙:国防科学技术大学,2012:5-6.
  • 7Bayer U, Habibi I, Balzarotti D, et al. A View on Current Malware Behaviors [ EB/OL]. ( 2009-03-31 ) 2013-11-02-]. https://www, usenix, org/legacy/e- vents/leet09/tech/full papers/bayer/bayer html.

二级参考文献9

  • 1朱秋萍,毛平平,罗俊.基于关联规则的入侵检测系统[J].计算机工程与应用,2004,40(26):160-162. 被引量:7
  • 2Xu Jianyun, Sung A H, Chavez E Polymorphic Malicious Executable Scanner by API Sequence Analysis[C]//Proc. of the 4th Int'l Conference on Hybrid Intelligent Systems. Washington, USA: [s. n.], 2004.
  • 3Kamber M, Han Jiawei, Chiang Jenny. Metarule-guided Mining of Multi-dimensional Association Rules Using Data Cubes[C]//Proc. of the 3rd Int'l Conf. on Knowledge Discovery and Data Mining. California, USA: [s. n.], 1997: 207-210.
  • 4Agrawal R. Mining Association Rules Between Sets of Items in Large Database[C]//Proc. of the ACM SIGMOD Conference on Management of Data. Washington, USA: ACM Press, 1993.
  • 5Sung A H, Xu Jianyun, Chavez E Analyzer for Vicious Executables[C]//Proc. of the 20th Annual Computer Security Applications Conference. Washington, USA: [s. n.], 2004: 326-340.
  • 6Christodorescu M, Jha S, Seshia S A, et al. Semantics Aware Malware Detection[C]//Proceedings of the 2005 IEEE Symposium on Security and Privacy. OakLand, USA: IEEE Press, 2005.
  • 7田新广,高立志,孙春来,张尔扬.基于系统调用和齐次Markov链模型的程序行为异常检测[J].计算机研究与发展,2007,44(9):1538-1544. 被引量:19
  • 8孙即祥.现代模式识别[M].长沙:国防科技大学出版社,2001.
  • 9孙全,叶秀清,顾伟康.一种新的基于证据理论的合成公式[J].电子学报,2000,28(8):116-119. 被引量:440

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部