Research and Implementation of Malicious Code Behavior Analysis

Article Preview

Abstract:

Along with the rapidly development of network technology, viruses, Trojans and other malicious code is updating unprecedented quickly, which constantly threatening the collective as well as the personal information safety.Analysis of malware based on the code behavioral characteristics aims at telling whether the code is malicious or not, which can effectively solve the problem caused by Zero-Day attacks that traditional anti-virus technology can hardly prevent. This paper studies how to monitor and record the API calling sequence when a program is running, and how to get the eigenvectors of behavior by means of analyzing the calling sequence of sensitive APIs, which makes the behavior of malicious code can be tracked, and providing supports and theoretical basis for addressing the potential threat of malicious code.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1938-1942

Citation:

Online since:

June 2012

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] SAATY TL. How to make a decision: the analytic hierarchy process[J]. European Journal of Operation Research, 1990, 48(1): 9.

Google Scholar

[2] Wanner PCH, Weber RF. Fault injection tool for network security evaluation [C]. Lecture Notes in Computer Science. Berlin: Springer-Verlag GmbH, 2003: 127.

Google Scholar

[3] Ido Dubrawksy, Chris Crayton, Michael Cross. How to Cheat at Securing Your Network. Science Press. (2007).

Google Scholar

[4] Fan Hong, Feng Dengguo. Security Protocol Theory and Method. Sceince Press. (2003).

Google Scholar

[5] Richard Tibbs, Edward Oakes. Firewalls and VPNs Principles and Practices. Tsinghua University Press. December (2008).

Google Scholar

[6] Mark S. Kadrick. Endpoint Security. Publishing House of Electronics Industry. June (2009).

Google Scholar

[7] Charlie Kaufman, Radia Perlman, Mike Speciner. Network Security Private Communication in a Public World. Publishing House of Electronics Industry. September (2004).

Google Scholar

[8] Liu Feng, Li Zhiyong, Tao Ran, Wang Yue. Network Warfare. National Defence Industry Press. January (2003).

Google Scholar

[9] Wang Menglong. Network Information Security Principal and Technology. China Railway Publishing House. November (2009).

Google Scholar