期刊文献+

程序属性的检测与程序属性的分类 被引量:1

Detection of Program Attributes and Classification of Program Attributes
下载PDF
导出
摘要 人们熟知的程序有恶意程序和善意程序,然而被病毒感染的程序具有某种特殊性质,可以定义为第三种类别的程序,第三种类别的程序是由本文提出。为了对三种不同类别的程序进行分类,本文提出解决问题的思路是:首先采用恶意权值计算公式对程序行为权值进行计算,判断该程序是善意程序还是恶意程序。如果是某个善意程序的权值发生了变化,那么该善意程序被病毒感染的可能性很大,因此对三种不同属性的程序分析后,最后使用MMTD算法对这三种程序进行分类:该程序是恶意程序,善意程序还是部分恶意部分善意的程序。 people familiar with the program has a malicious program and goodwill program,but infected by the virus program has some special properties,can be defined as the third categories of program,the third categories of program is put forward by this paper.To classify three different categories of program,this paper puts forward the thought to solve the problem are:first,the malicious weight calculation formula is adopted to the program weight value calculate,the program is goodwill or malicious programs.If it is a goodwill program in the changes of weight value,so the possibility of the goodwill program by the virus infection is very big,therefore after analyzing three different attributes of the program,finally using MMTD algorithm to classify the three programs:this program is malicious programs,goodwill program or malicious part well-intentioned.
作者 朱俚治 Zhu Lizhi(Information center,Nanjing University of Aeronautics and Astronautics,Nanjing 210016,China)
出处 《计算机测量与控制》 2018年第3期103-106,共4页 Computer Measurement &Control
关键词 MMTD 善意 权值 恶意 病毒 MMTD goodwill weight malware virus
  • 相关文献

参考文献10

二级参考文献83

  • 1何申,张四海,王煦法,马建辉,曹先彬.网络脚本病毒的统计分析方法[J].计算机学报,2006,29(6):969-975. 被引量:11
  • 2王辉,刘淑芬.一种可扩展的内部威胁预测模型[J].计算机学报,2006,29(8):1346-1355. 被引量:22
  • 3苏璞睿,冯登国.基于进程行为的异常检测模型[J].电子学报,2006,34(10):1809-1811. 被引量:17
  • 4孙丽华,张素霞.新一代计算机病毒的发展趋势及防治[J].河南气象,2006(4):84-84. 被引量:7
  • 5CNCERT/CC.CNCERT/CC 2007年上半年网络安全工作报告[OL].http://www.cen.org.cn/UserFiles/File/CNCERTCC200701.pdf,2008.
  • 6Trusted Computing Group. TCG Specification Architecture Overview Specification Revision 1.2[ S]. https://www. trustedcomputinggroup. org. Apt 2004.
  • 7L M Adleman. An abstract theory of computer viruses[ J] .Lecture Notes in Computer Science, 1990,403:109- 115.
  • 8F Cohen,Computer viruses:Theory and experiments[J]. Computers and Security, 1987,6(1) : 22 - 35.
  • 9M Christodorescu, S Jha. Static Analysis of Executables to Detect Malicious Pattems[ A ]. Proceedings of the 12th USENIX Security Symposium[ C]. Washington DC, August 2003. 169 - 186.
  • 10J Bergeron,M Debbabi, J Desharnais,M Erhioui, Y Lavoie,N Tawbi. Static detection of malicious code in executable programs[ A]. In: 1st Symposium on Requirements Engineering for Information Security[ C]. Indianapolis, 2001.525 - 530.

共引文献136

同被引文献20

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部