期刊文献+

基于动态行为的未知恶意代码识别方法 被引量:4

An Identification Method on Unknown Malicious Code Based on Dynamic Behaviour
在线阅读 下载PDF
导出
摘要 "特征码"法虽然可以准确地检测出已知的恶意代码,但是对未知的恶意代码的识别却无能为力.目前基于代码动态行为的分析方法是未知恶意代码检测技术的发展方向.本文通过对未知恶意代码在植入、安装及启动时调用的API序列作为依据,并分别使用最小距离分类器、K-最近邻、余弦相似度等分类方法对它进行识别,实验表明:对于未知恶意代码的识别,不同的分类算法有不同的优缺点,所以,具体选择哪个算法,要根据恶意代码识别的具体要求而定. Although the method of feature code can identify the known malicious code,it is helpless against the unknown malicious code.By now,the method based on behavior analysis is the direction of malicious code detection.This paper takes the API sequences called by code as the detection basis to determine whether the code is malicious or not when the code is implanted,installed or launched,and employs minimum distance classifier,K-the nearest and cosine similarity to distinguish them respectively.The experiments result shows that different methods have different advantages and disadvantages,so the choice of different method depends on different demand.
作者 朱立军
出处 《沈阳化工大学学报》 CAS 2012年第1期77-80,共4页 Journal of Shenyang University of Chemical Technology
关键词 恶意代码 动态行为 虚拟机 malicious code dynamic behavior virtual machine
  • 相关文献

参考文献7

  • 1Fred Cohen.Computer Viruses:Theory and Experi-ments[J].Computers&Security,1987:6(1):22-35.
  • 2Diomidis Spinellis.Reliable Identification of Bound-ed-lengh Viruses Is NP-comlee[J].IEEE Transac-tions on Information Theory,2003,49(1):280-284.
  • 3Xu Jianyun,Sung Andrew H,Mukkamala Srinivas,et al.Obfuscated Malicious Executable Scanner[J].Journal of Research and Practice in InformationTechnology,2007,(39)3:181-197.
  • 4Schultzm G,Eskin E,Zadok E,et al.DataminingMethods for Detection of new Malicious Executables[C]//Proceedings of the 2001 IEEE Symposiumon Security and Privacy.Washington:IEEE Comput-er Society,2001:38-49.
  • 5Huang Hsien-Der,Chuang Tsung-Yen,Tsai Yi-Lang,et al.Ontology-based Intelligent System for MalwareBehavioral Analysis[EB/OL].(2010-04-16)[2011-02-18].http://twman.nchc.org.tw/wp-content/uploads/2011/02/WCCI2010.pdf.
  • 6Xu J-Y,Sung A h,Chavez P,et al.Polymorphicma-licious Executable Scanner by API Sequence Analy-sis[C]//Proceedings of the 4th International Con-ference on Hybrid Intelligent Systems(HIS 04).Washington:IEEE Computer Society,2004:378-383.
  • 7裴要强,孟波.Windows黑客技术揭秘与攻防[M].北京:中国铁路出版社,2010:257-265.

同被引文献36

引证文献4

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部