期刊文献+

基于免疫原理的可执行文件签名验证模型的研究 被引量:2

Research on the signature and verification model of Portable Executable file based on the principle of immune
在线阅读 下载PDF
导出
摘要 病毒发现和防治策略是操作系统安全框架的重要组成部分。目前通过特征码匹配进行查杀病毒的方法通常落后于计算机病毒的发展,已经不能满足日益迫切的安全需求。文章根据生物体免疫系统检测病毒的机理,提出了一种对可执行文件签名验证的模型,通过文件签名界定“自我”和“非我”,并以此为依据完成系统中恶意代码的发现。最后介绍了在Windows操作系统下开发的基于可执行文件签名验证模型的病毒检测系统。 The policy of virus detection and prevention is an importance aspect of the safe frame in operating system. The method of pattern matching to detect and kill viruses is generally beyond the development of computer viruses at present, and couldn" t meet the ever imminent needs of security. In this paper according to the principle of the viruses detection of the biological immune system, a kind of portable executable file" s signature and verification model is put forward, and this method defines self and non-self by the file signature, which could be used to find the malice code in the system. At last a viruses detection system based on the model of portable executable file s signature and verification is introduced under the operate system of Windows in this paper.
出处 《微计算机信息》 北大核心 2005年第12X期42-45,共4页 Control & Automation
基金 国家863基金资助项目(2003AA146010)
关键词 免疫原理 宿毒 可执行文件 签名验证 防治策略 immunity virus portable executable file signature verification
  • 相关文献

参考文献6

  • 1Stephanie Forrest,Alan S.Perelson,Lawrence Allen and Rajesh Cheukuri.Self-Nonself Discrimination in a Computer[R].In Proceedings of 1994IEEE Symposium on Research in Security and Privacy,1994.
  • 2FORREST S,HOFMEYR S,SOMAYAJI A.Computer Immunology[J].Communications of the ACM,1997,40(10):88-96.
  • 3Forrest S,et al.Self-Nonself Discrimination in a computer[C].In:Proceedings of 1994 IEEE Symposium on Research in Security and Privacy(Oakland,Calif,May 16-18,1994),IEEE Computer Society Press,Los Alamitos,Calif,1994:202-212.
  • 4李胜勇,陈文元,张卫平.PKI技术及其存在问题的分析[J].微计算机信息,2005,21(1):171-172. 被引量:27
  • 5PERCUS JK,PERCUS O,PERELSON AS.Predicting the size of the antibody combining region from consideration of efficient self/nonself discrimination[A].Proceedings of the National Academy of Science[C],1993.1691-1695.
  • 6HOFMEYR S,FORREST S.Architecture for an Artificial Immune System[J].Evolutionary Computation,2000,8(4:) 443-473.

二级参考文献1

  • 1冯国登 裴定一.密码学导引[M].科学出版社,1999,4..

共引文献26

同被引文献5

  • 1宫会丽,丁香乾.GA和HS算法解决电子化配车方法比较[J].微计算机信息,2005,21(07X):147-148. 被引量:8
  • 2祝恩 殷建平.计算机病毒的本质特性分析及检测[J].计算机科学,2001,28:238-238.
  • 3Understanding Virus Behavior in 32-bit Operating Environments. Symantee,1997.
  • 4Fred Cohen. Computer Virus Theory an Experiments[J].Computer&Security,1987,6(1):22-35
  • 5唐常杰,胡军.计算机反病毒技术[M]电子工业出版社,1990.

引证文献2

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部