期刊文献+

基于启发式分析的木马检测技术研究 被引量:5

Research on Trojan Horse Detection Based-on Heuristic Analysis
在线阅读 下载PDF
导出
摘要 本文提出了基于启发式系统参数扫描和启发式代码分析的木马检测技术,改变了传统的木马检测技术,实验证明其能极大的减少检测的误报率和漏报率。 Trojan Horse detection based--on heuristic analysis changes the traditional methods. In this paper it introduces a heuristic method which is heuristic system parameter scanning and heuristic code analysis. It is verified that it can reduce the rate of false alarm and fail to report.
作者 杨玲 孟传良
出处 《现代机械》 2006年第4期61-63,共3页 Modern Machinery
关键词 网络安全启发式分析 木马检测 误报率 漏报率 network security heuristic analysis trojan horse detection the rate of false alarm the rate of fail to report
  • 相关文献

参考文献4

二级参考文献52

  • 1LEE W,STOLFO S,MOK K. A data mining framework for adaptive intrusion detection[EB/OL]. http://www.cs.columbia.edu/~sal/ hpapers/framework.ps.gz.
  • 2LEE W, STOLFO S J, MOK K. Algorithms for mining system audit data[EB/OL]. http://citeseer.ist.psu.edu/lee99algorithms.html. 1999.
  • 3KRUEGEL C, TOTH T, KIRDA E.Service specific anomaly detection for network intrusion detection[A]. Proceedings of the 2002 ACM Symposium on Applied Computing[C]. Madrid, Spain, 2002. 201-208.
  • 4LIAO Y, VEMURI V R. Use of text categorization techniques for intrusion detection[A]. 11th USENIX Security Symposium[C]. San Francisco, CA, 2002.
  • 5An extensible stateful intrusion detection system[EB/OL]. http://www.cs.ucsb.edu/~kemm/NetSTAT/doc/index.html.
  • 6ILGUN K. USTAT: A Real-Time Intrusion Detection System for UNIX[D]. Computer Science Dep University of California Santa Barbara, 1992.
  • 7The open source network intrusion detection system [EB/OL]. http://www.snort.org/.
  • 8KO C, FINK G, LEVITT K. Automated detection of vulnerabilities in privileged programs by execution monitoring[A]. Proceedings of the 10th Annual Computer Security Applications Conference [C]. Orlando, FL: IEEE Computer Society Press, 1994. 134-144.
  • 9Computer security & other applications of immunology[EB/OL]. http://www.cs.unm.edu/~forrest/isa_papers.htm.
  • 10GRUNDSCHOBER S. Sniffer Detector Report[R]. IBM Research Division Zurich Research Laboratory Global Security Analysis Lab, 1998.

共引文献263

同被引文献28

引证文献5

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部