期刊文献+

基于启发式行为监测的手机病毒防治研究 被引量:14

Research of Mobile Phone Virus Defense Based on Heuristic Behavior-Checking
在线阅读 下载PDF
导出
摘要 快速发展的移动通信技术给人们带来新的应用和服务的同时,也吸引了手机病毒的攻击。本文总结了手机病毒的传播途径和共有特性,比较现有的防毒技术,结合手机的特点,提出一种基于启发式行为监测的手机病毒防治技术,采用隐马尔科夫模型启发式分析程序的行为,以阻止病毒的恶意行为,保护手机安全。 The rapid development of mobile communication technology, not only presents new services and applications, but also attracts mobile phone viruses' attacks. For the above issues, this paper summarizes the mobile phone viruses' infection routes and common characteristics, compares the proposesed anti-virus technologies, and presents a mobile phone virus defense technique based on heuristic behavior-checking according to mobile phones' specialty. This method uses the hidden Markov model to heuristically analyze the behaviors of the application, so as to prevent the malicious behaviors of viruses, and protect the mobile phones' security.
出处 《计算机工程与科学》 CSCD 北大核心 2010年第1期35-38,112,共5页 Computer Engineering & Science
关键词 手机病毒 启发式 行为监测 隐马尔科夫模型 mobile phone virus heuristic behavior checking hidden Markov model
  • 相关文献

参考文献12

  • 1Dagon D, Martin T, Stamer T. Mobile Phones as Computing Devices.. The Viruses Are Coming! [C]//Pro of IEEE Pervasive Computing, 2004:11-15.
  • 2陈建民,张健,曹鹏.手机病毒的发展趋势与防范对策[J].信息网络安全,2006(11):52-55. 被引量:4
  • 3Cheng J,Song S H Y,Yang H,et al. SmartSiren: Virus Detection and Alert for Smartphones[C] //Pro of Mobisys' 07, 2007: 258-271.
  • 4李志,王延巍,朱林.手机病毒的现状与未来[J].电信技术,2006(3):87-90. 被引量:16
  • 5刘一静,孙莹,蔺洋.基于手机病毒攻击方式的研究[J].信息安全与通信保密,2007,29(12):96-98. 被引量:17
  • 6Toyssy S, Helenius M. About Malicious Software in Smartphones[J]. Computer Virology,2006, 2(2) : 109-119.
  • 7Bose A, Shin K G. On Mobile Viruses Exploiting Messaging and Bluetooth Services[C]//Proc of SeeureComm '06,2006 : 322-331.
  • 8Szor P. The Art of Computer Virus Research and Defense[M]. Addison Wesley Professional,2005.
  • 9Teck S Y, Hong T E. A Mobile Phone Malicious Software Detection Model with Behavior Checker[C] //Proc of HSI' 05,2005 : 57-65.
  • 10谭小彬,王卫平,奚宏生,殷保群.基于隐马尔可夫模型的异常检测[J].小型微型计算机系统,2004,25(8):1546-1549. 被引量:10

二级参考文献15

  • 1钱海川.手机安全风险防范[J].软件世界,2006(2):73-73. 被引量:3
  • 2李志,王延巍,朱林.手机病毒的现状与未来[J].电信技术,2006(3):87-90. 被引量:16
  • 3[3]王江民.计算机病毒的发展趋势及KV3000的反病毒对策[EB/OL].http://my.poco.cn/myBlogDetailhtx-id-s6088-userid-707428-pri--n-0.shtml,2007-05-01.
  • 4Anderson J P. Computer security threat monitoring[R]. Technical Report, TR80904, Washington: Anderson Co. , 1980.
  • 5Denning D E. An intrusion detection model[J]. IEEE Transactions on Software Engineering. 1987,13(2): 222-232.
  • 6Ye N. A markov chain model of temporal behavior for anomal detection [C]. In:Proceedings of the 2000 IEEE Systems, Man,and Cybernetics Information Assurance and Security Workshop,2000.
  • 7Jha S,Tan K,Maxion R. Markov chains, classifiers, and intrusion detection A[C]. In: Proceedings of Computer Security Foundations Workshop, 14th IEEE. 2001, 206-219.
  • 8Warrender C,Forrest S,Pearlmutter B. Detecting intrusion using system calls: alternative data models[C]. In: Proceedings of the 1999 IEEE Symposium on Security and Privacy. IEEE Computer Society, 1999,133-145.
  • 9Qiao Y, Xin X W, Bin Y, Ge S. Anomaly intrusion detection method based on HMM[J]. Electronics Letters, June 2002,38 (13): 663-664.
  • 10Rabiner L R. A tutorial on hidden markov models and selected applications in speech recognition[J]. Proceedings of the IEEE, 1989,77 (2): 257-286.

共引文献39

同被引文献91

引证文献14

二级引证文献38

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部