首页> 外文会议>Evolutionary and bio-inspired computation: Theory and applications V >Behavioral analysis of malicious code through network traffic and system call monitoring
【24h】

Behavioral analysis of malicious code through network traffic and system call monitoring

机译:通过网络流量和系统调用监视进行恶意代码的行为分析

获取原文
获取原文并翻译 | 示例

摘要

Malicious code (malware) that spreads through the Internet-such as viruses, worms and trojans-is a major threat to information security nowadays and a profitable business for criminals. There are several approaches to analyze malware by monitoring its actions while it is running in a controlled environment, which helps to identify malicious behaviors. In this article we propose a tool to analyze malware behavior in a non-intrusive and effective way, extending the analysis possibilities to cover malware samples that bypass current approaches and also fixes some issues with these approaches.
机译:如今,通过Internet传播的恶意代码(恶意软件)(如病毒,蠕虫和特洛伊木马程序)已成为当今信息安全的主要威胁,对犯罪分子而言是一项可观的生意。有多种方法可通过监视恶意软件在受控环境中运行时的行为来对其进行分析,这有助于识别恶意行为。在本文中,我们提出了一种以非侵入性和有效方式分析恶意软件行为的工具,将分析可能性扩展到涵盖绕过当前方法的恶意软件样本,并解决了这些方法的某些问题。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号