研究并实现基于网络行为分析的未知恶意代码检测系统,有效地对未知恶意代码进行检测。
To research and implement the unknown malicious code detection system based on network behavior analysis, in order to detect unknown malicious code effectively.
由于主题安装,博客拥有者会把一段从来没有经过检测的代码安装到WordPress所在的服务器上,一点也没有意识到隐藏的恶意代码就在里边。
Because of the ease of theme installation, blog owners who’d never install untested code on a server are deploying themes on their blogs, not realizing that hidden code is coming along for the ride.
随之出现的恶意代码分析检测技术,包括特征码扫描等,能在一定程度上进行分析检测工作,但仍无法避免各自的缺陷。
Followed with malicious code analysis and detection technology, for example, the signature scanning, can analysis and detect a certain extent, but still could not avoid their defects.
对新出现的还未被计算机安全机构提取出特征码并加入到特征库中的新恶意代码的检测还不是很成功。
Emerging computer security agencies have not yet been extracted and added to the signature features of the library's new malicious code detection is not yet very successful.
本文研究恶意代码种类及特征,充分讨论各种分析检测方法的缺陷和不足。
This paper studies the types and features of malicious code, discusses the deficiencies and shortcomings of some analysis and detection methods.
现有的检测恶意代码的方法或软件,在发现恶意代码时,恶意代码往往已经入侵到了机器中。
The current method of detection of malicious code or software, the discovery of malicious code, malicious code often has invaded into the machine.
基于进程行为的入侵检测技术是主机防范入侵和检测恶意代码的重要技术手段之一。
Intrusion Detection based on process 'behaviors is one of the mainstream techniques for defend against intrusion and malicious code.
主要研究方向:信息安全,软件漏洞分析与检测,恶意代码分析与防范。
Research Interest: Information security, Vulnerability analysis and detection, Malware analysis and prevention.
测试结果表明,经过模糊变换的恶意代码能够逃避大部分基于误用检测的恶意代码对抗工具。
The results show that malicious code using obfuscating transformation can be free of most of malicious code detecting tools who adopt the misuse intrusion detection.
恶意代码大量快速的繁衍使得恶意代码自动化检测成为必然趋势,加壳程序识别是恶意代码分析的一个必要步骤。
The proliferation of malicious code makes automatic malicious code detection an inevitable trend. Packed Portable Executable (PE) files identification is a necessary step of malicious code analysis.
对于恶意代码提出了可实施的检测系统方案和删除的方法。
An executable examining project and method of cleaning viciousness code are presented.
同时,当前的恶意代码发现技术还是以特征码扫描为主,辅助以启发式扫描,行为检测法等检测方法为辅。
At the same time, the current technology or malicious code was found to signature-based scanning, supplemented by heuristic scanning, behavior detection, supplemented by other detection methods.
通过对行为的分析检测其是否是恶意代码。
Detect whether a executable code is malicious code through the analysis of behavior.
基于以上的想法与技术,本论文设计了一个恶意代码的主动发现系统来进行恶意代码的检测。
Based on the above ideas and technology, this paper, an active found systems for malicious code is designed for malicious code detection.
于是,迫切需要一种恶意代码的分析检测手段对恶意代码进行详尽的分析。
Thus, there is urgent need for a malicious code analysis and detection means to carry out a detailed analysis of malicious code.
恶意代码的检测技术主要分为基于主机的和基于网络节点的检测,本文主要研究针对基于主机的高隐藏性木马的检测技术。
Malware detection techniques can be divided into host-based and network-based, this paper mainly focuses on studies of host-based deep hidden Trojan detection techniques.
恶意代码的检测技术主要分为基于主机的和基于网络节点的检测,本文主要研究针对基于主机的高隐藏性木马的检测技术。
Malware detection techniques can be divided into host-based and network-based, this paper mainly focuses on studies of host-based deep hidden Trojan detection techniques.
应用推荐