期刊文献+

基于API拦截的主动防御系统 被引量:1

The Defense System Basing on API Interception Network
在线阅读 下载PDF
导出
摘要 通过分析API拦截的研究成果,开发出基于API拦截的主动防御系统。针对启发式主动防御存在误判的现象,添加白名单机制降低了误判率。同时本系统通过插件模式为使用者开发自定义规则插件,提高了系统的可扩展性。 According to the analysis of research results of API interception ,we develop a defense system basing on API interception. Due to the misjudgment of heuristic defense system, we add the whitelisting mechanism to reduce the false positive rate. In order to improve the system's scalability, we add the plug-in mode and the users can develop plug-ins with custom rules.
出处 《信息网络安全》 2012年第7期29-31,共3页 Netinfo Security
基金 广东省自然科学基金项目[9151027501000054 s2011010003409] 2011年华南师范大学大学生创新实验计划项目
关键词 API拦截 白名单 插件 API interception whitelisting plug-in
  • 相关文献

参考文献8

二级参考文献25

  • 1曹骞,樊晓平,谢岳山.大型分布式管理信息系统的安全问题研究[J].计算机应用研究,2007,24(3):121-124. 被引量:3
  • 2Skoudis E,Zehser L.Malware:Fighting Malicious Code[M].[S.l.]:Prentice Hall,2003.
  • 3Kruegel C,Robertson W,Valeur F,et al.Static Disassembly of Obfuscatod Binaries[D].Santa Barbara,CA,USA:Reliable Software Group,Computer Science Department,University of California,2004.
  • 4Christodorescu M,Jha S.Static Analysis of Executables to Detect Malicious Patterns[C]//Proceedings of the 12th USENIX Security Symposium.BerKeley,CA,USA:[s.n.],2003.
  • 5CHRISTODORESCU M,JHA S,KRUEGEL C.Mining specifications of malicious behavior[C] //Proc of the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering.2007.
  • 6RIECK K,HOLZ T,WILLEMS C,et al.Learning and classification of malware behavior[C] //Proc of DIMVA.2008.
  • 7BAECHER P,KOETTER M,HOLZ T,et al.The nepenthes platform:an efficient approach to collect malware[C] //Proc of the 9th Symposium on Recent Advances in Intrusion Detection.2006:165-184.
  • 8BAILEY M,OBERHEIDE J,ANDERSEN V,et al.Automated classification and analysis of Internet malware[C] //Proc of the 10th Symposium on Recent Advances in Intrusion Detection.2007:178-197.
  • 9BAYER U,KRUEGEL C,KIRDA E.TTAnalyze:a tool for analyzing malware[C] //Proc of EICAR.2006.
  • 10BURGES C.A tutorial on support vector machines for pattern recognition[J].Knowledge Discovery and Data Mining,1998,2(2):121-167.

共引文献37

同被引文献2

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部