首页> 外文期刊>Indian Journal of Science and Technology >Epidemic Dynamics of Malicious Code Detection Architecture in Critical Environment
【24h】

Epidemic Dynamics of Malicious Code Detection Architecture in Critical Environment

机译:关键环境中恶意代码检测体系的流行病学动态

获取原文
获取外文期刊封面目录资料

摘要

In present world applications of software in other domains have their own privileges and their own control over other application also fulfilling their own testing methods acting as a tool in solving the given problem. Application integrity is highlighted in existing work but in our proposed approach MCBA (Malicious Code Behavior Analysis). In our proposed study the method of MCBA approach error correcting codes in the kernel is incorporated. Our objective is to incorporate a protection mechanism that saves the application even though the system’s memory gets corrupted. In exploring the trusted MCBA Server to identify and monitor the portion of the system where corruption occurs and the server segregates the reason for various malicious impacts. Therefore, two approaches have been simulated: one is authenticated check and the next is unauthenticated check. In an authenticated check, a matching schema (e.g., the MCBA) applies dataset pattern recognition techniques to check malicious pattern by comparing it to the incoming applications during execution, if malicious packet is found it protects the system, in an unauthenticated check, the malicious packet from the guest OS for example root kits enters into our local system and it securely stores a cloned image of the guest OS memory at boot time, this method incorporates a VMM (Virtual Memory Monitor) and it allows only the instructions to read from the cloned copy of memory but never execute the instruction, though it is so, sometimes the instructions are malicious and it is unsecured. This paper emphasizes the MCBA architecture, incorporates monitoring, detecting and healing process which are so feasible to apply in real time environment ,it is very economically used for the technical programmers who are designing source code for various domains in Software market.
机译:在当今世界中,其他领域的软件应用程序拥有自己的特权,并且对其他应用程序的控制也实现了自己的测试方法,这些方法充当解决给定问题的工具。在现有工作中,但在我们建议的方法MCBA(恶意代码行为分析)中,强调了应用程序完整性。在我们提出的研究中,采用了MCBA内核中的纠错码方法。我们的目标是采用一种保护机制,即使系统的内存损坏也可以保存应用程序。在探索受信任的MCBA Server时,识别并监视系统中发生损坏的部分,并且服务器将各种恶意影响的原因分开。因此,已模拟了两种方法:一种是经过身份验证的检查,另一种是未经身份验证的检查。在经过身份验证的检查中,匹配的架构(例如MCBA)通过在执行期间将其与传入的应用程序进行比较来应用数据集模式识别技术来检查恶意模式,如果发现了恶意数据包,则会在未经身份验证的检查中保护系统,从而保护恶意软件。来宾操作系统的数据包(例如,根工具包)进入我们的本地系统,并在引导时安全地存储来宾操作系统内存的克隆映像,此方法结合了VMM(虚拟内存监视器),并且仅允许从克隆的内存副本,但是从不执行指令,尽管如此,有时指令是恶意的并且是不安全的。本文着重介绍了MCBA体系结构,它融合了监视,检测和修复过程,这些过程非常适合在实时环境中应用,对于在软件市场中为各个领域设计源代码的技术程序员而言,它非常经济。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号