期刊文献+

基于自相似特性的恶意代码动态分析技术 被引量:3

Malicious Code Dynamic Analysis Based on Self Similar Characteristics
在线阅读 下载PDF
导出
摘要 在比较恶意代码的分析技术的基础上,将自相似特性技术引入恶意代码的动态分析中。跟踪同类型的恶意程序,采集API函数的调用序列,提取关键特征信息,得到时间调用序列,并进行归一化处理。通过重新标度权差分析算法、回归方差算法和Higuchi算法,分别计算程序的Hurst指数,匹配同种恶意程序的自相似性。将恶意程序与正常程序的API调用序列和Hurst指数进行对比实验表明,恶意程序调用API函数与正常程序存在差异,并且同一类型的恶意程序确实具有自相似性,从而能够动态检测出恶意程序。 Based on the comparison between the two kinds of analytical technologies of malicious codes, the paper introduces self similar characteristics into the dynamic analysis of malicious code process. It follows the tracks of the same type of malicious programs, capture the API calls information, pick up key fea- tures from time sequence, and then normalize it. The Hurst index by the series use of R/S method, aggre- gated variance method and higuchi method was computed respectively, and the similarity of the same type malicious programs was matched. Comparing the API functions and Hurst index that malicious programs and normal procedures call, it comes to the conclusion that malicious programs have some differences in calling API function with normal procedure, and the same type of malicious programs are self-similar, so that it identifies malicious programs with dynamism.
作者 李鹏 王汝传
出处 《南京邮电大学学报(自然科学版)》 北大核心 2012年第3期86-90,共5页 Journal of Nanjing University of Posts and Telecommunications:Natural Science Edition
基金 国家自然科学基金(60973139 60773041) 江苏省科技支撑计划(工业)项目(BE2010197 BE2010198) 江苏省级现代服务业发展专项资金 高校科研成果产业化推进工程项目(JH10-14) 江苏高校科技创新计划项目(CX10B-196Z) 江苏省六大高峰人才项目(2008118) 教育部高等学校博士学科点专项科研基金(20103223120007) 南京邮电大学青蓝计划(NY208010)资助项目
关键词 恶意代码 自相似性 API序列 HURST指数 malicious code self similar API series HURST index
  • 相关文献

参考文献8

  • 1中国互联网络信息中心.第26次中国互联网络发展状况统计报告[R].北京,2010-07.
  • 2YAN Wei, WU E. Toward Automatic Discovery of Malware Signature for Anti-Virus Cloud Computing[ C ]//ICST Lecture Notes of the In- stitute for Computer Sciences, Social Informatics and Telecommuni- cations Engineering, Complex Sciences. Heidelberg Berlin : Springer, 2009:724 - 728.
  • 3CARBONE A, CASTELLIA G, STANLEY H E. Time-dependent Hurst exponent in financial time series [ J ]. Physica A : Statistical Mechanics and its Applications,2004,344 ( 1 ) : 267 - 271.
  • 4BECCHI M. From Poisson Processes to Self-Similarity:A Survey of Network Traffic Models[ R]. Citeseer,2008 : 1 - 13.
  • 5MANDELBROT B B. Limit Theorems on the Self-Normalized Range for Weakly and Strongly Dependent Processes [ J ]. Probability Theo- ry and Related Fields,1975,31 (4) :271 -285.
  • 6ADLER R J,FELDMAN R E,TAQQU M S. A practical guide to heavy tails: Statistical techniques and applications [ M ]. Switzer- land: Birkhauser, 1998 : 186 - 218.
  • 7TAQQU M S, TEVEROVSKY V, WILLINGER W. Estimators for Long-Range Dependence:An Empirical Study [ J ]. Fractals, 1995,3 (4) :785 -788.
  • 8Apimonitor. Win32 API monitor[ EB/OL]. http://www, apimoni- tor. com/.

共引文献8

同被引文献14

引证文献3

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部