期刊文献+

应用专家系统开发Windows恶意代码检测系统的研究 被引量:7

Development of Windows Malware Detection System Based on Expert System
原文传递
导出
摘要 传统的基于特征的恶意代码检测方法无法检测未知恶意代码以及一些采用加壳等规避技术的恶意代码。为克服这些缺点,文章提出了基于专家系统的启发式检测方法。该方法可以检测采用了底层技术的恶意代码,如rootkit,以及加过壳或加过密的恶意代码,而且其检测率比一些知名的反病毒工具的检测率要高。 Traditional signature-based malware detection method is not able to detect zero-day attacks and some malwares adopting circumvention techniques such as packer. In order to overcome this drawback, this paper proposes a heuristic detection technique based on expert systems. The technique could detect malwares using known techniques, even bottomlevel techniques, for example, the rootkit technique. It also can detect those malwares even after they are packed or crypto-protected by any packer or protector. And its detection rate is much higher than some well-known anti-virus tools.
出处 《信息安全与通信保密》 2009年第9期77-79,82,共4页 Information Security and Communications Privacy
基金 "863"计划(2006AA01Z449)资助
关键词 启发式技术 专家系统 行为检测 heuristic technique expert system behavior detection
  • 相关文献

参考文献4

  • 1Preda M D, Christodorescu M, Jha S, et al. A Semantics-Based Approach to Malware Detection [J]. POPL'07 January 17-19, 2007, Nice, France.
  • 2Szor Peter. The Art of Computer Virus Research and Defence[S]. Addison Wesley Professional, ISBN 0-321-30454-3, February 2005, Chapter 11.
  • 3FRANS VELDMAN, Why Do We Need Heuristics [C]. Virus Bulletin Conference, 1995: XI-XV.
  • 4What is CLIPS[EB/OL]. http: //clipsrules.sourceforge.net/WhatIsCLIPS.html.

同被引文献43

  • 1陈洪泉.恶意软件检测中的特征选择问题[J].电子科技大学学报,2009,38(S1):53-56. 被引量:9
  • 2王海峰,段友祥,刘仁宁.基于行为分析的病毒检测引擎的改良研究[J].计算机应用,2004,24(B12):109-110. 被引量:12
  • 3卢浩,胡华平,刘波.恶意软件分类方法研究[J].计算机应用研究,2006,23(9):4-7. 被引量:9
  • 4王一平,韦卫.Windows下代码签名验证的研究与实现[J].计算机应用与软件,2007,24(1):162-164. 被引量:3
  • 5Rash M. Linux防火墙[M]. 陈 健, 译. 北京: 人民邮电出版社, 2009.
  • 6Zhao Yuehua, Hu Bai, Zhou Conghua. Formal Description and Verification of Security Filtered Rules[C] //Proc. of the 1st International Conference on Networking and Distributed Computing. Hangzhou, China: IEEE Computer Society, 2010.
  • 7Chiong R, Dhakal S. On the Insecurity of Personal Firewall[J]. Information Technology, 2008, (8): 1-10.
  • 8Russinovich M E, Solomon D A. Microsoft Windows Internals, Fourth Edition: Microsoft Windows Server 2003, Windows XP, and Windows 2000[M]. Redmond, USA: Microsoft Press, 2004.
  • 9国内最流行十大木马查杀[EB/OL]. (2006-06-25). http://www. yesky.com/SoftChannel/2355578868924416/2001129/207532.
  • 10MIHAI C,SOMESH J,SANJIT S.A Semantics-Aware Malware Detection[C].USA:Proceedings-IEEE Symposium on Security and Privacy,2005:32-46.

引证文献7

二级引证文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部