Malicious Code Detection Model Based on Behavior Association

来源 :Tsinghua Science and Technology | 被引量 : 0次 | 上传用户:chenzenghua
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Malicious applications can be introduced to attack users and services so as to gain financial rewards,individuals’sensitive information,company and government intellectual property,and to gain remote control of systems.However,traditional methods of malicious code detection,such as signature detection,behavior detection,virtual machine detection,and heuristic detection,have various weaknesses which make them unreliable.This paper presents the existing technologies of malicious code detection and a malicious code detection model is proposed based on behavior association.The behavior points of malicious code are first extracted through API monitoring technology and integrated into the behavior;then a relation between behaviors is established according to data dependence.Next,a behavior association model is built up and a discrimination method is put forth using pushdown automation.Finally,the exact malicious code is taken as a sample to carry out an experiment on the behavior’s capture,association,and discrimination,thus proving that the theoretical model is viable. Malicious applications can be introduced to attack users and services so as to gain financial rewards, individuals’ sensitive information, company and government intellectual property, and to gain remote control of systems. Host, traditional methods of malicious code detection, such as signature detection, behavior detection, virtual machine detection, and heuristic detection, have various weaknesses which make them unreliable.This paper presents the existing technologies of malicious code detection and a malicious code detection model is proposed based on behavior association.The behavior points of malicious code are first extracted through API monitoring technology and integrated into the behavior; then a relation between behaviors is established according to data dependence .Next, a behavior association model is built up and a discrimination method is put forth using pushdown automation. Finally, the exact malicious code is taken as a sample to carry out an experiment on the behavior’s captu re, association, and discrimination, thus proving that the theoretical model is viable.
其他文献
为探究吕家坨井田地质构造格局,根据钻孔勘探资料,采用分形理论和趋势面分析方法,研究了井田7
Several public-key encryption schemes used to solve the problem of ciphertext data processing on the fly are discussed.A new targeted fully homomorphic encrypti
期刊
[摘要]医院信息系统(Hospital Information System, HIS) 的开发与应用推动了医院管理的深刻变革,计算机网络技术和数据技术的不断发展,为医院管理的变革在更大范围、更深层次上进行提供了更高、更强的支持。然而,尽管医院信息系统在全国各级医院得到了大力推广,但它的积极作用、深刻意义还远远没有体现和发挥出来,有必要进行深入的分析。  [关键词]信息系统;微机室;技术路线;完善
物理是一门注重实验的学科,而其实验的目的不仅仅是让学生掌握扎实的实践技能,还重在培养学生的思维能力与创新能力.高中物理一直被学生公认为是比较难的学科,再加上受传统教学模式的影响,导致了学生对物理没有太大的兴趣,甚至还会出现抵触情绪,造成了学校教育的困难,同时也给学生的发展带来了影响.  一、高中物理创新实验的设计  1.演示实验的设计  在物理实验教学过程中,教师一般都会在学生动手操作之前进
Network security requirements based on virtual network technologies in IaaS platforms and corresponding solutions were reviewed.A dynamic network security archi
为探究吕家坨井田地质构造格局,根据钻孔勘探资料,采用分形理论和趋势面分析方法,研究了井田7