首页> 外文会议>International conference on computer science and it applications;International conference on ubiquitous information technologies >Study on Malicious Code Behavior Detection Using Windows Filter Driver and API Call Sequence
【24h】

Study on Malicious Code Behavior Detection Using Windows Filter Driver and API Call Sequence

机译:使用Windows筛选器驱动程序和API调用序列检测恶意代码行为的研究

获取原文

摘要

As the internet environment has been developed recently, threats and damage to malicious codes are increasing day by day. Most of the damage is caused by new and variant malicious codes because of the vulnerability of Endpoint. Most of the Anti-Virus used in endpoints run on a signature basis, and as intelligence on malicious code is developed, the detection rate of existing Anti-Virus is declining. Therefore, there is a need for a technology capable of handling new and variant malicious codes in real time on the endpoint. In this paper, we present a method for analyzing behaviors of malicious code using behavioral analysis of the Windows kernel function call sequence.
机译:随着最近互联网环境的发展,恶意代码的威胁和破坏日益增加。由于Endpoint的漏洞,大多数损坏是由新的恶意代码和变体恶意代码造成的。终结点计算机中使用的大多数防病毒软件都是基于签名运行的,并且随着对恶意代码的智能化发展,现有防病毒软件的检测率正在下降。因此,需要一种能够在端点上实时处理新的和变体的恶意代码的技术。在本文中,我们提出了一种使用Windows内核函数调用序列的行为分析来分析恶意代码行为的方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号