期刊文献+

恶意文档检测研究综述 被引量:5

A Survey of Research on Malicious Document Detection
下载PDF
导出
摘要 近年来,以窃取敏感数据、破坏国家重要基础设施为主要目标的高级持续威胁(Advanced Persistent Threat,APT)已经给国家安全带来了严重的威胁。与可执行文件相比,恶意文档具有涉及领域广、影响范围大、用户防范意识不足、攻击手段灵活多样、难以检测等诸多特点,已经成为实施APT攻击的重要载体。因此有必要关注恶意文档检测已有的研究成果与发展趋势。本文首先对文档类型及其结构进行了解析,然后阐述了文档的安全隐患、攻击技术以及传播途径等。将当前恶意文档检测方法归纳为静态检测法、动态检测法、动静态结合检测法以及其他相关研究等四类,分别对各类检测方法的研究状况、进展进行了分析和总结。最后,提出了当前恶意文档检测研究的性能评价方法,综述了代表性的数据、检测工具和平台,并展望了未来的研究方向。 In recent years,Advanced Persistent Threat(APT),which has the primary purpose of stealing sensitive data and undermining critical national infrastructure,has already brought serious threats to national security.Compared with executive files,malicious documents have several unique characteristics,such as wide range of coverage,large scope of influence,insufficient user awareness,flexible and diverse attack methods,and it is a challenge to detect.This has made it an important carrier for implementing APT attacks.Therefore,it is necessary to pay attention to the existing research results and development trends of malicious documents.This paper first analyzes the document type and its structure,and proposes the security risks,attack techniques and propagation paths of the document.The current malicious document detection methods are categorized into four groups:static detection methods,dynamic detection methods,hybrid detection methods and others.The research status and research progress of each field are analyzed and summarized.Finally,the performance evaluation methods,data sets,representative detection tools and platforms of current malicious document detection research are reviewed and proposed,and the future research directions are envisaged.
作者 喻民 姜建国 李罡 刘超 黄伟庆 宋楠 YU Min;JIANG Jianguo;LI Gang;LIU Chao;HUANG Weiqing;SONG Nan(Institute of Information Engineering,Chinese Academy of Sciences,Beijing 100093,China;School of Cyber Security,University of Chinese Academy of Sciences,Beijing 100049,China;School of Information Technology,Deakin University,Geelong,VIC 3220 Australia)
出处 《信息安全学报》 CSCD 2021年第3期54-76,共23页 Journal of Cyber Security
基金 中国科学院青年创新促进会(No.2021155)资助。
关键词 恶意文档 恶意代码 检测方法 性能评价 特征分析 malicious document malicious code detection method performance evaluation feature analysis
  • 相关文献

参考文献11

二级参考文献73

  • 1穆祥昆,王劲松,薛羽丰,黄玮.基于活跃熵的网络异常流量检测方法[J].通信学报,2013,34(S2):51-57. 被引量:20
  • 2张保稳,施军,张晖.缓冲区溢出漏洞检测技术研究进展[J].计算机应用与软件,2006,23(1):3-4. 被引量:4
  • 3闵华清,卢炎生,蒋晓宇.基于共同进化计算的分类规则算法[J].华南理工大学学报(自然科学版),2006,34(6):69-73. 被引量:1
  • 4Kumar S, Spafford E H. A generic virus scanner in c ++ [ C]//Proeeedings of the 8th Computer Security Applications Conference, 1992 : 210-219.
  • 5Sulaiman A, Ramamoorthy K, Mukkamala S, et al. Malware examiner using disassembled code(MEDIC) [ R]. Systems, Man and Cybernetics (SMC) Information Assurance Workshop,2005.
  • 6Kanzaki Y, Monden A, Nakamura M, et al. Exploiting self-modification mechanism for program protection[ C]//Proc of the 27th Annual International Computer Software and Applications Conference, 2003:170-181.
  • 7Bertrand A, Matias M, Koen D B. A model for self-modifying code[C]//The 8th Information Hiding Conference. Berlin Heidelberg, 2007 : 232-248.
  • 8Cmelik B,Keppel D. Shade: A fast instruction-set simulator for execution profiling [ C ]//Proceedings of the 1994 ACM SIGMETRICS Conference on Measurement and Modeling of Computer Systems. Nashville, Tennessee, United States ,1994 :128-137.
  • 9Thomas E D. Metamorphism as a software protection for non-malicious Code[ J]. Air Force Inst Technology, 2006:8-11.
  • 10Christodorescu M, Kinder J, Jha S,et al. Malware normalization [ R ]. University of Wisconsin, Madison, USA,2005.

共引文献263

同被引文献36

引证文献5

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部