Research on Hiding Technology of Web Malicious Code

Article Preview

Abstract:

In modern network confrontation, it is very important to improve the viability of web malicious code. According to the generation and propagation characteristics, we propose the web malicious code hidden solutions which are based on deformation and encryption. Combining with MS09002 vulnerabilities we give an application example of web Trojan hidden. Test results show that the proposed integrated solution has the better capacity of avoiding virus killing and the stronger hidden performance. The significant improvement of viability of web malicious code is very important of application.

You have full access to the following eBook

Info:

Periodical:

Pages:

310-314

Citation:

Online since:

September 2011

Export:

Share:

Citation:

[1] Wang Changguang, Bai Xu, Fu Shuai, Ma Jianfeng, Modeling Malicious Code Spread in Scale-Free Networks of Moving Agents, Computer Science and Software Engineering. (2008)546 - 549.

DOI: 10.1109/csse.2008.660

Google Scholar

[2] Rabek J C, Roger I, Detection of injected, dynamically generated and obfuscated malicious code, Proceedings of the 2003 ACM Workshop on Rapid Malcode. (2003)76-82.

DOI: 10.1145/948187.948201

Google Scholar

[3] Gamayunov D, Nguyen Quan, Sakharov F, et al, Racewalk: Fast Instruction Frequency Analysis and classification for shellcode Detection in Network Flow, Computer Network Defense. (2009)4-12.

DOI: 10.1109/ec2nd.2009.9

Google Scholar

[4] Madihah S, Nazean J, Knowledge Structure on Virus for User Education, Computational Intelligence and Security. (2006)1515-1518.

DOI: 10.1109/iccias.2006.295313

Google Scholar

[5] Jichiang Tsai, Chung-Hsin Feng, Chuyuan Tsai, A Network Safety-Defense Mechanism with the Linux Security Module, IEEE Region 10 Confedrence. (2006)1-4.

DOI: 10.1109/tencon.2006.343980

Google Scholar

[6] Salmani H, Tehranipoor M, Plusquellic J, A Novel Technique for Improving Hardware Trojan Detection and Reducing Trojan Activation Time, IEEE. (2011)1.

DOI: 10.1109/hst.2009.5224968

Google Scholar

[7] Danyang Cao, Bingru Yang, Design and implementation for MD5-based data integrity checking system. 2010(608-611).

Google Scholar

[8] Yongje Choi, Mooseop Kim, Taesung Kim et al, Low power implementation of SHA-1 algorithm for RFID system. (2006)1-5.

DOI: 10.1109/isce.2006.1689488

Google Scholar