首页> 外文学位 >Automated reverse engineering of malware to develop network signatures to match with known network signatures.
【24h】

Automated reverse engineering of malware to develop network signatures to match with known network signatures.

机译:恶意软件的自动逆向工程以开发网络签名以与已知网络签名匹配。

获取原文
获取原文并翻译 | 示例

摘要

The detection of network-based malware is often reactionary; discovery generally happens after the malware has begun attacking the target system. Detecting the attack after the fact affects the performance of the victim device and potentially the entire computer network of the victim device. Intrusion detection systems are deployed to monitor network traffic for malware attacks, but unfortunately these systems cannot preemptively detect malicious behavior on a network. Automated reverse engineering is able to detect potentially malicious network behavior of a binary offline prior to a network-based attack. Collecting information found inside a binary, such as strings and function calls, compiling this information into generated signatures, and then comparing to known network signatures allows for malicious behavior of a binary to be discovered and quarantined before attacking a device and network.
机译:基于网络的恶意软件的检测通常是反动的。发现通常发生在恶意软件开始攻击目标系统之后。在事实发生之后检测攻击会影响受害设备的性能,并可能影响受害设备的整个计算机网络。部署了入侵检测系统来监视网络流量中是否存在恶意软件攻击,但不幸的是,这些系统无法抢先检测网络上的恶意行为。自动化逆向工程能够在基于网络的攻击之前检测二进制脱机的潜在恶意网络行为。收集二进制文件中发现的信息(例如字符串和函数调用),将该信息编译为生成的签名,然后与已知的网络签名进行比较,可以在攻击设备和网络之前发现并隔离二进制文件的恶意行为。

著录项

  • 作者

    Sinema, Dan.;

  • 作者单位

    Utah State University.;

  • 授予单位 Utah State University.;
  • 学科 Computer science.
  • 学位 M.C.S.
  • 年度 2014
  • 页码 72 p.
  • 总页数 72
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号