期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Detecting Hidden Malware Method Based on "In-VM" Model 被引量:2
1
作者 陈林 刘波 +2 位作者 胡华平 肖枫涛 张静 《China Communications》 SCIE CSCD 2011年第4期99-108,共10页
Security tools are rapidly developed as network security threat is becoming more and more serious.To overcome the fundamental limitation of traditional host-based anti-malware system which is likely to be deceived and... Security tools are rapidly developed as network security threat is becoming more and more serious.To overcome the fundamental limitation of traditional host-based anti-malware system which is likely to be deceived and attacked by malicious codes,VMM-based anti-malware systems have recently become a hot research field.In this article,the existing malware hiding technique is analyzed,and a detecting model for hidden process based on "In-VM" idea is also proposed.Based on this detecting model,a hidden process detection technology which is based on HOOK SwapContext on the VMM platform is also implemented successfully.This technology can guarantee the detecting method not to be attacked by malwares and also resist all the current process hiding technologies.In order to detect the malwares which use remote injection method to hide themselves,a method by hijacking sysenter instruction is also proposed.Experiments show that the proposed methods guarantee the isolation of virtual machines,can detect all malware samples,and just bring little performance loss. 展开更多
关键词 network security Virtual Machine Monitor(VMM) malware detection hidden process hardware virtualization
下载PDF
FTC of hidden Markov process with application to resource allocation in air operation
2
作者 Neng Eva Wu Matthew Charies Ruschmann 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2011年第1期12-21,共10页
This paper investigates the feedback control of hidden Markov process(HMP) in the face of loss of some observation processes.The control action facilitates or impedes some particular transitions from an inferred cur... This paper investigates the feedback control of hidden Markov process(HMP) in the face of loss of some observation processes.The control action facilitates or impedes some particular transitions from an inferred current state in the attempt to maximize the probability that the HMP is driven to a desirable absorbing state.This control problem is motivated by the need for judicious resource allocation to win an air operation involving two opposing forces.The effectiveness of a receding horizon control scheme based on the inferred discrete state is examined.Tolerance to loss of sensors that help determine the state of the air operation is achieved through a decentralized scheme that estimates a continuous state from measurements of linear models with additive noise.The discrete state of the HMP is identified using three well-known detection schemes.The sub-optimal control policy based on the detected state is implemented on-line in a closed-loop,where the air operation is simulated as a stochastic process with SimEvents,and the measurement process is simulated for a range of single sensor loss rates. 展开更多
关键词 hidden Markov process(HMP) DECENTRALIZATION information fusion fault tolerant estimation air operation receding horizon control(RHC).
下载PDF
Simulation of Somatotype of Hydraulic Turbine Draft-Tube
3
作者 DU Ting-na HUI Yuan 《Computer Aided Drafting,Design and Manufacturing》 2011年第1期33-38,共6页
Elbow draft-tubes are widely used in large- and medium-sized hydropower stations in many countries. During the application, handling the somatotype of elbow tubes has been found challenging: in order to maintain the ... Elbow draft-tubes are widely used in large- and medium-sized hydropower stations in many countries. During the application, handling the somatotype of elbow tubes has been found challenging: in order to maintain the designed shape of draft tube and to meet the requirement of construction lofting, the configuration of reinforcing bars and the fabrication of templates, the geometry of elbow tubes has to be accurately calculated to draw engineering graphics. Based on the derived equations in this paper, the motion of elbow tube curve envelope is simulated by using computers, which shows directly the smoothness of the curve and provides dynamic simulation for the study and optimization of the design and construction of elbow draft tubes, along with the front view and bottom view. 展开更多
关键词 computer application draft-tube elbow tube curve envelope motion simulation hidden line elimination process computer graphic processing
下载PDF
Hidden Process Offline Forensic Based on Memory Analysis in Windows 被引量:1
4
作者 CUI Jingsong ZHANG Heng +2 位作者 QI Jing PENG Rong ZHANG Manli 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2017年第4期346-354,共9页
Malicious software programs usually bypass the detection of anti-virus software by hiding themselves among apparently legitimate programs.In this work,we propose Windows Virtual Machine Introspection(WVMI)to accurat... Malicious software programs usually bypass the detection of anti-virus software by hiding themselves among apparently legitimate programs.In this work,we propose Windows Virtual Machine Introspection(WVMI)to accurately detect those hidden processes by analyzing memory data.WVMI dumps in-memory data of the target Windows operating systems from hypervisor and retrieves EPROCESS structures’address of process linked list first,and then generates Data Type Confidence Table(DTCT).Next,it traverses the memory and identifies the similarities between the nodes in process linked list and the corresponding segments in the memory by utilizing DTCT.Finally,it locates the segments of Windows’EPROCESS and identifies the hidden processes by further comparison.Through extensive experiments,our experiment shows that the WVMI detects the hidden process with high identification rate,and it is independent of different versions of Windows operating system. 展开更多
关键词 virtual machine introspection hidden process detection process linked list memory forensics
原文传递
A Less Resource-Consumed Security Architecture on Cloud Platform 被引量:1
5
作者 CUI Jingsong LIAO Kun +2 位作者 TIAN Changyou PENG Rong WU Xun 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2016年第5期407-414,共8页
Traditional security framework in cloud platform usually brings self-vulnerability and considerable additional resource consumption. To solve these problems, we propose an external processes monitoring architecture fo... Traditional security framework in cloud platform usually brings self-vulnerability and considerable additional resource consumption. To solve these problems, we propose an external processes monitoring architecture for current popular cloud platform Open Stack with kernel-based virtual machine(KVM). With this architecture, we can monitor all active processes in online virtual machine(VMs) and scan them for their potential maliciousness in OpenS tack with no agent, and can also detect hidden processes in offline VMs’ memory snapshots and notice the user to decide whether to kill them when VMs become active. Analysis and experimental results show that our architecture is able to reduce consumption of CPU, memory and bandwidth in cloud platform and can detect viruses and hidden processes effectively in VMs. 展开更多
关键词 cloud security process monitoring process analyze hidden process detection
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部