期刊文献+

恶意软件分类方法研究 被引量:9

Research on Classification of Malware
下载PDF
导出
摘要 在详细论述恶意软件的工作原理、运行机制的基础上,对各类恶意软件进行系统的分类,阐述各类恶意软件间的关系,归纳恶意软件的发展趋势并给出阻断恶意软件的方法。 Basing on the analyse on operating mechanism of malware, various malware were classified clearly. After expanding on the relationship between these malware,the trends in evolvement of the malware were concluded. Finally the method to block malware was proposed.
出处 《计算机应用研究》 CSCD 北大核心 2006年第9期4-7,12,共5页 Application Research of Computers
基金 国家"863"计划资助项目(2003AA142010)
关键词 信息安全 恶意软件 防火墙 入侵检测系统 混合型攻击 Information Security Malware Firewall IDS Blended Attack
  • 相关文献

参考文献23

  • 1Ed Skoudis,Lenny Zeltser.Malware:Fighting Malicious Code[M].US:Prentice Hall PTR,2003.16-18.
  • 2Gary McGraw,Greg Morrisett.Attacking Malicious Code:A Report to the Infosec Research Council[J].IEEE Software,2000,17(5):1-2.
  • 3Spyware,Adware,and Malware[EB/OL].http://www.cs.umn.edu/help/security/spyware.php,2005-06.
  • 4Greg Hoglund,Gary McGraw.Exploiting Software:How to Break Code[M].US:Addison Wesley,2004.60-81.
  • 5Jon Erickson.Hacking:The Art of Exploitation[M].US:No Starch Press,2003.48-54.
  • 6Harold Thimbleby.A Framework for Modelling Trojans and Computer Virus Infection[J].Computer Journal,1998,41(7):444-458.
  • 7Lenny Zeltser.Reverse Engineering Malware[EB/OL].http://www.zeltser.com/reverse-malware-paper/,2005-06.
  • 8Tom Chen.Trends in Viruses and Worms[J].Internet Protocol Journal,2003,6(3):8-12.
  • 9Laurianne McLaughlin.Bot Software Spreads,Causes New Worries[J].IEEE Distributed Systems Online,2004,5(6):3-5.
  • 10Bill Mccarty.Botnets:Big and Bigger[J].IEEE Security and Privacy,2003,1(4):87-80.

同被引文献74

引证文献9

二级引证文献31

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部