Research of Computer Virus Detection Technology Based on the Virtualization Platform

Article Preview

Abstract:

The characteristics of computer virus runtime behavior can be found by dynamic monitoring technology which deals with the obfuscated or packed computer virus. Virtual technology can provides safety monitoring environment for software, therefore the especially virtual environment is scarce to design for virus monitoring analysis. In this paper, a virtual computer virus monitoring is introduced based on the secondary development of Xen. The scheme can provide a more comprehensive and security computer virus monitoring on the basis of the virtual hardware.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

405-408

Citation:

Online since:

December 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] F. Cohen. Computer viruses: Theory and experiments. Computers and Security, June, (1987).

Google Scholar

[2] D. Chess and S. White. An undetectable computer virus. In Proceedings of the 2000 Virus Bulletin Conference (VB2000), (2000).

Google Scholar

[3] VMware, Inc. VMware Converter User's Manual , Version: 3. 0 RC, Palo Alto, CA, Dec (2006).

Google Scholar

[4] Paul Barham , Boris Dragovic , Keir Fraser , Steven Hand , Tim Harris , Alex Ho , Rolf Neugebauer , Ian Pratt , Andrew Warfield, Xen and the art of virtualization, In Proceedings of the nineteenth ACM symposium on Operating systems principles, October 19-22, 2003, Bolton Landing, NY, USA.

DOI: 10.1145/945445.945462

Google Scholar

[5] Zongqu Zhao, Junfeng Wang†, Chonggang Wang. An unknown malware detection scheme based on the features of graph. Security and Communication Networks, 2013, 6(2): 239-246.

DOI: 10.1002/sec.524

Google Scholar

[6] Zongqu Zhao, Junfeng Wang, Jinrong Bai. A malware detection method based on the control-flow construct feature of software. IET Information Security (IEE Proceedings - Information Security), in press (2013).

DOI: 10.1049/iet-ifs.2012.0289

Google Scholar