Run-time malware detection strategies are efficient and robust, which get more and more attention.
运行时的恶意软件检测策略是有效的,强大的,这让越来越多的关注。
The "Protection" covers static and dynamic malware detection, including real-world 0-day attack testing.
“防护”包括静态与动态恶意软件检测,涵盖了零日漏洞攻击等测试。
Identify changes to security policy, software configurations, and the addition of malware detection and prevention controls.
认定安全策略、软件配置和恶意软件检测和防御控制的改变。
That helps with malware detection because a virus built for one operating system may not be clever enough to hide from another OS.
这种方式有助于检测恶意软件。因为针对某种操作系统编制的恶意软件还没有“聪明”到在另一种操作系统中也能做到隐身不见。
This paper proposes a semantics-based framework of malware detection for detecting whether a program is a variation of the malware.
最后,通过一个实现了该框架的原型系统来说明基于语义的恶意软件判定器框架的可行性。
Malware detection techniques can be divided into host-based and network-based, this paper mainly focuses on studies of host-based deep hidden Trojan detection techniques.
恶意代码的检测技术主要分为基于主机的和基于网络节点的检测,本文主要研究针对基于主机的高隐藏性木马的检测技术。
Grosse: I agree that regulations that would talk about intrusion detection or malware detection or deep pack-et inspection on the network really are being passed by with current technology trends.
Grosse:确实,那些谈论网络中的入侵检测、恶意软件检测或深度包检测的法规正逐渐被当前技术潮流所忽略。
This means that malware can avoid detection simply by delaying performing any malicious actions.
这意味着恶意软件可以简单地通过延迟表现所有可疑动作来规避检测。
Research Interest: Information security, Vulnerability analysis and detection, Malware analysis and prevention.
主要研究方向:信息安全,软件漏洞分析与检测,恶意代码分析与防范。
This model is used as a basis for a detection algorithm which is automatically enhanced and updated with new malware samples submitted by our users to our servers.
应用该模型,以此为基础,为一个检测算法是自动升级和更新了新的恶意软件样品提交用户来我们的服务器上。
When used in conjunction with an Intrusion Detection System, valuable information about the behavior of the malware, packet captures and the malware binary itself may be obtained.
当它与入侵检测系统联用时,关于恶意软件的行为、数据包捕获和恶意二进制文件本身这些有价值的信息就可以被获得。
When used in conjunction with an Intrusion Detection System, valuable information about the behavior of the malware, packet captures and the malware binary itself may be obtained.
当它与入侵检测系统联用时,关于恶意软件的行为、数据包捕获和恶意二进制文件本身这些有价值的信息就可以被获得。
应用推荐