THE BEHAVIOR ORIENTED DETECTION OF MALICIOUS CODE OVERVIEW

被引:0
|
作者
Deng, Jin-Cheng [1 ]
Liu, Dan [1 ]
Hu, Yue [1 ]
Liang, Zong-Wen [2 ]
机构
[1] Univ Elect Sci & Technol China, Res Inst Elect Sci & Technol, Chengdu 611731, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
关键词
Malicious Code; Unknown Virus; Behavioral Analysis; Virtualization;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the ever greater development of technology of malicious code, malware has been becoming one of the most serious threats to information security. And since the encryption and transformation of program code lead the traditional signature scanning not so instantaneous and effective any longer, researching a new method of detection of malicious code has no time to delay. In recent years, although the technology of detection of malicious code, especially behavior oriented detection, has made a great progress rapidly, it also faces great challenges and problems to be overcome. This paper is a detailed overview of this behavior oriented detection of malicious code including architecture, variety and development tendency of this technology, furthermore it provides the next researcher key points.
引用
收藏
页码:235 / 238
页数:4
相关论文
共 50 条
  • [1] Early detection of malicious behavior in javascript code
    Schütt, Kristof
    Kloft, Marius
    Bikadorov, Alexander
    Rieck, Konrad
    [J]. Proceedings of the ACM Conference on Computer and Communications Security, 2012, : 15 - 24
  • [2] MALICIOUS CODE DETECTION WITH INTEGRATED BEHAVIOR ANALYSIS
    Li, Xiao-Yong
    Liu, Wei-Wei
    [J]. PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-6, 2009, : 2797 - 2801
  • [3] Efficient Detection of the Return-Oriented Programming Malicious Code
    Chen, Ping
    Xing, Xiao
    Han, Hao
    Mao, Bing
    Xie, Li
    [J]. INFORMATION SYSTEMS SECURITY, 2010, 6503 : 140 - 155
  • [4] Malicious code detection and prevention in virtual behavior mechanism
    Li, Xiao-Yong
    Zhou, Li-Tao
    Shi, Yong
    Guo, Yu
    [J]. Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology, 2010, 32 (01): : 101 - 106
  • [5] Malicious Code Detection Model Based on Behavior Association
    Lansheng Han
    Mengxiao Qian
    Xingbo Xu
    Cai Fu
    Hamza Kwisaba
    [J]. Tsinghua Science and Technology, 2014, 19 (05) : 508 - 515
  • [6] Malicious Code Detection Model Based on Behavior Association
    Han, Lansheng
    Qian, Mengxiao
    Xu, Xingbo
    Fu, Cai
    Kwisaba, Hamza
    [J]. TSINGHUA SCIENCE AND TECHNOLOGY, 2014, 19 (05) : 508 - 515
  • [7] A Malicious Code Detection Method Based on Ensemble Learning of Behavior
    Xu, Xiao-Bo
    Zhang, Wen-Bo
    He, Chao
    Luo, Yi
    [J]. Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2019, 42 (04): : 89 - 95
  • [8] A malicious code detection method based on integrated behavior characterization
    Liu, Wei-Wei
    Shi, Yong
    Guo, Yu
    Han, Zhen
    Shen, Chang-Xiang
    [J]. Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2009, 37 (04): : 696 - 700
  • [9] Simulation on static detection of malicious code based on behavior information gain
    Wei, Pengcheng
    Shi, Chengxiang
    He, Fangcheng
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 38 (06) : 7683 - 7692
  • [10] Metamorphic malicious code behavior detection using probabilistic inference methods
    Choi, Chang
    Esposito, Christian
    Lee, Mungyu
    Choi, Junho
    [J]. COGNITIVE SYSTEMS RESEARCH, 2019, 56 : 142 - 150