期刊文献+

云基础设施的恶意软件检测方法 被引量:1

Detection of malware on cloud infrastructure
下载PDF
导出
摘要 云基础设施的恶意软件检测是必要的。为了避免被恶意软件发现,针对云基础设施的特点,设计了一个外部的恶意软件检测器。首先,利用一个具有特殊权限且位于目标之外的虚拟机收集可疑进程的系统调用;然后,将收集到的系统调用转换为进程的行为图;最后,利用行为图间的相似性来判断可疑进程是否为恶意软件。实验结果表明,平均检测率为89%,误报率低于5%,检测器对客户虚拟机的性能影响不大,且能够抵抗添加率低于30%的系统调用攻击。 Malware detection is essential for cloud infrastructure.In the study,an external detector of malware is proposed based on characteristics of cloud infrastructure to avoid being detected by malware.First,system calls of a suspected process are gathered by the Forensic Virtual Machine(FVM)which is a privileged virtual machine outside the target.They then are transformed into a behavioral graph.Finally,the similarity between behavioral graphs is calculated to determine if a suspected executable is malicious.Results show the average detection rate is 89%and the false positive rate is below 5%.The impact of the FVM on the guest virtual machine is insignificant.It is also confirmed that our methodology is robust for the addition attack on system calls under the addition rate is below 30%.
作者 张小莉 程光 Zhang Xiaoli;Cheng Guang(Department of Intelligent control,Shanxi Railway Vocational and Technical College,Shanxi Taiyuan 030013;Key Laboratory of Computer Network and Information Integration(Southeast University),Ministry of Education,Jiangsu Nanjing 211189;School of Cyber Science and Engineering,Southeast University,Jiangsu Nanjing 211189)
出处 《网络空间安全》 2020年第10期62-67,共6页 Cyberspace Security
基金 国家重点研发计划“宽带通信和新型网络”重点专项自主可控高性能路由器及关键技术项目(项目编号:2018YFB1800600)。
关键词 恶意软件 行为图 云基础设施 malware behavior graph cloud infrastructure
  • 相关文献

参考文献2

二级参考文献40

  • 1陈海燕,刘建勋,胡蓉.可信Web服务合成研究综述[J].吉首大学学报(自然科学版),2011,32(1):30-36. 被引量:3
  • 2汪清明.基于SOA的ERP系统体系结构的研究[J].计算机应用,2007,27(2):413-414. 被引量:32
  • 3严蔚敏 吴伟民.数据结构[M].北京:清华大学出版社,1997..
  • 4Hamadi R,Benatallah B.Petri net-based model for Web service composition[C]//Proceedings of the Australasian Database Conference,Adelaide,Australia,2003:191-200.
  • 5Zhang R,Arpinar B,Aleman-Meza B.Automatic composition of semantic Web services[C]//Proceedings of International Conference on Web Services,Las Vegas,USA,2003:38-41.
  • 6Liu Y T,Ngu A H H,Zeng L Z.Qo S computation and policing in dynamic Web service selection[C]//Proceedings of the 13th International World Wide Web Conference(WWW 2004).New York:ACM Press,2004:66-73.
  • 7J?sang A,Ismail R,Boyd C.A survey of trust and reputation systems for online service provision[J].Decision Support Systems,2007,43(2):618-644.
  • 8Fu X D,Zou P,Jiang Y,et al.Qo S consistency as basis of reputation measurement of web service[C]//Proceedings of the First International Symposium on Data,Privacy and E-Commerce,Chengdu,China,2007:391-396.
  • 9Hart E,Timmis J.Application areas of AIS:the past,the present and the future[J].Applied Soft Computing,2008,8(1):191-201.
  • 10Tian M,Gramm A,Ritter H,et al.Efficient selection and monitoring of Qo S-aware Web services with the Ws-Qos framework[C]//IEEE/WIC/ACM International Conference on Web Intelligence(WI 2004),Beijing,2004:152-158.

共引文献4

同被引文献10

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部