期刊文献+

基于行为分析的木马检测系统 被引量:8

The Trojan horse Detection System Based on Behavioral Analysis
原文传递
导出
摘要 本文通过对木马及木马检测技术的研究,提出了基于行为分析的木马检测技术。主要对木马的行为特征进行抽象描述,首先根据一定的规则建立一个行为特征数据库,并结合启发式分析器来进一步分析判断被检测的程序是否是木马,同时做相应的处理。实验表明,与传统的木马检测技术相比,该算法准确率高,实时性强,占用系统资源少。 Through studying techniques of the Trojan and anti-Trojan,this paper presents the Trojan-detection technology based on behavioral analysis.Through the abstract description of the Trojan's behavior,according to certain rules to establish a behavior feature database,and combining the heuristic analyzer to further analysis and judge whether the program is the Trojans,then do the appropriate processing at last.Comparing with the traditional technology of the Trojan horse detection,the experiments show this algorithm has high accuracy rating,and is effective and efficient in real time;what's more,it takes up little system resources.
作者 颜会娟 秦杰
出处 《网络安全技术与应用》 2010年第8期9-11,共3页 Network Security Technology & Application
基金 国家自然科学基金项目(No60373003) 河南工业大学校基金项目(No2006BS009)资助
关键词 木马 行为特征 系统调用 行为分析 Trojan behavioral features system call behavioral analysis
  • 相关文献

参考文献5

二级参考文献45

  • 1唐焕文,张立卫,王雪华.一类约束不可微优化问题的极大熵方法[J].计算数学,1993,15(3):268-275. 被引量:75
  • 2尹清波,张汝波,李雪耀,王慧强.基于动态马尔科夫模型的入侵检测技术研究[J].电子学报,2004,32(11):1785-1788. 被引量:9
  • 3唐焕文,张立卫.凸规划的极大熵方法[J].科学通报,1994,39(8):682-684. 被引量:49
  • 4李兴斯.一类不可微优化问题的有效解法[J].中国科学(A辑),1994,24(4):371-377. 被引量:137
  • 5陈友,程学旗,李洋,戴磊.基于特征选择的轻量级入侵检测系统[J].软件学报,2007,18(7):1639-1651. 被引量:78
  • 6Ye N. A Markov chain model of temporal behavior for anomaly detection. In: Proceedings of the 2000 IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop, West Point, NY, 2000, 166~169
  • 7Jha S., Tan K., Maxion R.A., Roy A. Markov chains, classifiers and intrusion detection. In: Proceedings of the 14th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia, 2001, 206~219
  • 8Hofmeyr S.A., Forrest S., Somayaji A. Intrusion detection using sequences of system calls. Journal of Computer Security, 1998, 6(3): 151~180
  • 9Lee W., Dong X. Information-Theoretic measures for anomaly detection. In: Proceedings of the 2001 IEEE Symposium on Security and Privacy, Oakland, California, 2001, 130~143
  • 10Eskin E., Lee W., Stolfo S.J. Modeling system calls for intrusion detection with dynamic window sizes. In: Proceedings of the DARPA Information Survivability Conference and Exposition II (DISCEX II), Anaheim, CA, 2001, 165~175

共引文献72

同被引文献39

  • 1辛毅,高泽霖,黄伟强.挖矿木马的检测与防护技术分析[J].网络空间安全,2022,13(1):41-46. 被引量:10
  • 2陈丽波,吴庆波.Linux内核跟踪机制LTT的研究[J].计算机工程,2005,31(12):61-63. 被引量:6
  • 3苏璞睿,冯登国.基于进程行为的异常检测模型[J].电子学报,2006,34(10):1809-1811. 被引量:17
  • 4邓子宽,范明钰,王光卫,朱大勇.Snort入侵检测系统中TCP流重组的研究[J].信息安全与通信保密,2007,29(2):65-67. 被引量:6
  • 5YE Nong. A Markov chain model of temporal behavior for anomaly detection:Proc of IEEE Systems, Man,and Cybernetics Information Assurance and Security Work- shop[C]. New York: IEEE Computer Society, 2000: 171-174.
  • 6WARRENDER C, FORREST S, PEARLMUTTER B. Detecting intrusion using systemcalls: alternative data models : Proc of IEEE Symposium on Security and Pri- vacy[C]. Washington DC: IEEE Computer Society, 1999:133-145.
  • 7Marc Fossi, et al. Symantec Global Internet Security Threat Report Trends for 2009 VolumeXV [ EB/OL]. SymantecCorporation. http ://eval. symantec, com/mk- tginfo/enterprise/white_papers/b- whitepaper_internet _security_threat_report_xv_04 - 2010. en - us. pdf . 2010.04. 2010-05-04.
  • 8金山安全实验室.2011-2012中国互联网安全研究报告[EB/OL].http://www.ikinshan.com/zhuanti/2011report.2011.2011-02-25.
  • 9中国计算机安全网.2012年十大安全威胁趋势[EB/OL].http://www.infosee.org.en/news/news-view.php?newsid=14149.2010.12.29.2011-01-06.
  • 10黎亮,傅一帆.基于嵌入式Linux的内核错误跟踪技术[J].电子技术应用,2008,34(9):106-108. 被引量:1

引证文献8

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部