期刊文献+

病毒检测技术的研究与0.5级环 被引量:3

Research on Detecting Virus and 0.5 Level Ring
在线阅读 下载PDF
导出
摘要 检测病毒是清除病毒的第一步,它是维护系统安全的关键技术之一。在描述了由比较法和校验和法组成的综合检测法后,设计了一种消除病毒的算法。为了支持比较法,提出原始文件概念,在环保护特权规则的基础之上,提出0.5级环方法,并给出了存储原始文件的逻辑空间和写操作的环境。文中还对建立原始文件的必要性、原始文件集的组成原则进行了讨论,并描述了原始文件的硬件保护方法,且给出了逻辑示意图。文中试图为网络安全提供一种新的研究思路。 Detecting virus is the first step, it is one of the key techniques of maintaining systems safety. After describing comprehensive detection method that is composed of comparing method and checking sum method, a kiss virus algorithm is designed. To support comparing method, primitive file is proposed. The 0.5 level ring is proposed based on the privileged regulation of ring protection, and the logical space of storing primitive files and the environment of write operation are given. Additionally, the necessity of setting primitive file and the principles of building primitive file set are discussed, and the protecting way with hardware is described ,the logical sketch is given. It attempts to provide a new thinking for the research of network security.
作者 朱俚治
出处 《计算机技术与发展》 2012年第9期225-227,231,共4页 Computer Technology and Development
基金 国家"863"高技术发展计划项目(2009AA043303) 软件开发环境国家重点实验室开放课题(SKLSDE-2011KF-04)
关键词 病毒 检测 环保护 virus detecting ring protection
  • 相关文献

参考文献11

二级参考文献45

  • 1张波云,殷建平,张鼎兴,嵩敬波.基于K-最近邻算法的未知病毒检测[J].计算机工程与应用,2005,41(6):7-10. 被引量:15
  • 2王辉,刘淑芬.一种可扩展的内部威胁预测模型[J].计算机学报,2006,29(8):1346-1355. 被引量:24
  • 3苏璞睿,冯登国.基于进程行为的异常检测模型[J].电子学报,2006,34(10):1809-1811. 被引量:17
  • 4VladimirN Vapnik著 张学工译.统计学习理论的本质[M].北京:清华大学出版社,2000.1-125.
  • 5CNCERT/CC.CNCERT/CC 2007年上半年网络安全工作报告[OL].http://www.cen.org.cn/UserFiles/File/CNCERTCC200701.pdf,2008.
  • 6Trusted Computing Group. TCG Specification Architecture Overview Specification Revision 1.2[ S]. https://www. trustedcomputinggroup. org. Apt 2004.
  • 7L M Adleman. An abstract theory of computer viruses[ J] .Lecture Notes in Computer Science, 1990,403:109- 115.
  • 8F Cohen,Computer viruses:Theory and experiments[J]. Computers and Security, 1987,6(1) : 22 - 35.
  • 9M Christodorescu, S Jha. Static Analysis of Executables to Detect Malicious Pattems[ A ]. Proceedings of the 12th USENIX Security Symposium[ C]. Washington DC, August 2003. 169 - 186.
  • 10J Bergeron,M Debbabi, J Desharnais,M Erhioui, Y Lavoie,N Tawbi. Static detection of malicious code in executable programs[ A]. In: 1st Symposium on Requirements Engineering for Information Security[ C]. Indianapolis, 2001.525 - 530.

共引文献73

同被引文献22

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部