期刊文献+

基于模糊模式识别的未知病毒检测 被引量:7

Unknown computer virus detection based on fuzzy pattern recognition
在线阅读 下载PDF
导出
摘要 提出了一种基于模糊模式识别的检测方法来实现对计算机病毒的近似判别。该方法可以克服病毒特征代码扫描法不能识别未知病毒的缺点。在该检测方法的基础上,文中设计了一个病毒检测网络模型,此模型既可以实现对已知病毒的查杀,又可以对可疑程序行为进行分析评判,最终实现对未知病毒的识别。 A fuzzy recognition algorithm to detect computer virus approximately was present. It could overcome the shortage of normal virus scanner - which could not detect unknown virus. Based on this method, a virus detect network model was designed. This model can detect virus in the on-line system, and it can also detect known and unknown computer virus by analyzing the program behavior.
出处 《计算机应用》 CSCD 北大核心 2005年第9期2050-2053,2062,共5页 journal of Computer Applications
基金 国家自然科学基金资助项目(60373023) 湖南省自然科学基金资助项目(04JJ6032)
关键词 计算机病毒 模糊模式识别 模糊集 病毒检测 computer virus fuzzy pattern recognition fuzzy set virus detection
  • 相关文献

参考文献8

  • 1COHEN F. Computer Viruses: Theory and Experiments[J]. Computers & Security, 1987, 6(1): 22 -35.
  • 2SPINELLIS D. Reliable Identification of Bounded-Length Viruses Is NP-Complete[J]. IEEE Trans-actions on information Theory, 2003,49(1): 280 -284.
  • 3TESAURO GJ, KEPHART JO, SORKIN GB. Neural networks for computer virus recognition[J]. IEEE Expert, 1996, (8): 5 - 6.
  • 4BARGIELA A, PEDRYCZ W, HIROTA K. Granular prototyping in fuzzy clustering[J]. IEEE Trans-actions on Fuzzy Systems, 2004, 12(5): 697 - 709.
  • 5SCHULTZ M, ESKIN E, ZADOK E, et al. Data mining methods for detection of new malicious executables[A]. Proceedings of the IEEE Symposium on Security and Privacy[C]. Los Alamitos, CA,2001.38 -49.
  • 6KRUGLINSKI DJ, WINGO S, SHEPHERD G. Programming Visual C++ [M] . Washington :Micosoft Press, 1998.
  • 7张波云,殷建平,张鼎兴,嵩敬波.基于K-最近邻算法的未知病毒检测[J].计算机工程与应用,2005,41(6):7-10. 被引量:15
  • 8祝恩,殷建平,蔡志平,赵建民.计算机病毒自动变形机理的分析[J].计算机工程与科学,2002,24(6):14-17. 被引量:17

二级参考文献10

  • 1祝恩,殷建平.计算机中的安全问题分析[J].计算机科学,2000,27(增刊):109-111.
  • 2[4]Charles P Pfleeger. Security in Computing[M].Prentice Hall PTR,1997.
  • 3[5]Fred Cohen. Computer Virus:Theory and Experiments[J]. Computer & Security,1987,6(11):22-35.
  • 4F Cohen. Computer Viruses:Theory and Experiments[J].Computers & Security, 1987; 6 ( 1 ): 22~35.
  • 5Diomidis Spinellis. Reliable Identification of Bounded-LengthViruses Is NP-Complete [J].IEEE TRANSACTIONS ON INFORMATIONTHEORY,2003 ;49( 1 ) :280~284.
  • 6Gerald J Tesauro,Jeffrey O Kephart,Gregory B Sorkin. Neural net works for computer virus recognition[J].IEEE EXPERT, 1996; (8) :5~6.
  • 7Tom M Mitchell. Machine Learning[M].New York:McGraw-Hill, 1997.
  • 8David J Kruglinski,Scot Wingo,George Shepherd..Programming Visual C++[M].Washington: Micosoft Press, 1998.
  • 9祝恩 殷建平.计算机病毒的本质特性分析及检测[J].计算机科学,2001,28:238-238.
  • 10蔡志平,殷建平,祝恩,许江.一种防范Win9X下文件型病毒的方案[J].计算机工程与科学,2001,23(4):90-92. 被引量:4

共引文献29

同被引文献69

引证文献7

二级引证文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部