期刊文献+

非包还原恶意代码检测的特征提取方法

A Non-packets-reducing Based Malware Signature Extraction Method
在线阅读 下载PDF
导出
摘要 恶意代码在网络中传播时不会表现出恶意行为,难以通过基于行为的检测方法检测出。采用基于特征的方法可以将其检测出,但需要进行网络包还原,这在大流量时对网络数据包进行还原不仅存在时空开销问题,且传统的特征提取方法提取的特征往往过长,容易被分割到多个网络数据包中,导致检测失效。本文提出非包还原恶意代码特征提取,采用自动化与人工分析相结合、基于片段的特征码提取,以及基于覆盖范围的特征码筛选等方法,实验结果表明,对恶意软件片段具有一定识别能力。 The popularity of the network has brought great convenience for the dissemination of malicious code. Because malicious code in the network communication does not show any malicious behavior, it is difficult to detect their spreading using behavior-based detection methods. Signature detection methods can be used to detect malicious code spreading, but, not only data packets reducing requires time and space cost tradeoffs in the large flow network, but also, the malicious code signatures extracted from traditional metfiods are often too long, and the signatures are easily split into multiple network packets, resulting in failure detection. Malicious code detection method based on non - packet reducing (NPR Based Malware Signature Extraction Method)proposed in this paper, to a certain extent solved the above problems. Experiment results show that the proposed NPR method has good results in detecting small fragments of malicious code.
出处 《信息安全与技术》 2013年第12期25-28,共4页
基金 国家863项目资助(编号:2009AA01Z435 2009AA01Z403)
关键词 特征码提取 非包还原方法 恶意代码检测 signature extraction non-packets-reducing method malware detection
作者简介 王光卫(1959-),男,学士,工程师. 陈健(1985-),男,硕士,工程师.| 范明钰(1962-),女,博士,教授.
  • 相关文献

参考文献9

二级参考文献41

  • 1陈洪泉.恶意软件检测中的特征选择问题[J].电子科技大学学报,2009,38(S1):53-56. 被引量:9
  • 2张波云,殷建平,蒿敬波,张鼎兴.基于多重朴素贝叶斯算法的未知病毒检测[J].计算机工程,2006,32(10):18-21. 被引量:22
  • 3卢浩,胡华平,刘波.恶意软件分类方法研究[J].计算机应用研究,2006,23(9):4-7. 被引量:9
  • 4李勇,左志宏.目标代码混淆技术综述[J].计算机技术与发展,2007,17(4):125-127. 被引量:10
  • 5Cohen F. Computer Viruses: Theory and Experiments[J]. Computers and Security, 1987(6): 22- 35.
  • 6Cohen F. Computational Aspects of Computer Viruses[J]. Computers and Security, 1989(8) : 325 - 344.
  • 7Chess D M, White S R. An Undetectable Computer Virus[C]//Proceedings of Virus Bulletin Conference, 2000.
  • 8Bergeron J, Debbabi M, Desharnais J, et al. Static Detection of Malicious Code in Executable Progams[C]//1^st Symposium on Requirements Engineering for Information Security, Indianapolis, IN, 2001.
  • 9Landi W. Undecidability of Static Analysis[C]//ACM Letters on Programming Languages and Systerm (LOPLAS), ACM Press, 1992: 323- 337.
  • 10Christodorescu M, Jha S. Static Analysis of Executables to Detect Malicious Pattems[ C]//Pmceedings of the 12^th USENIX Security Symposium, 2003:169 - 186.

共引文献111

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部