Malicious Code Detection Model Based on Behavior Association

被引:5
作者
Han, Lansheng [1 ]
Qian, Mengxiao [1 ]
Xu, Xingbo [1 ]
Fu, Cai [1 ]
Kwisaba, Hamza [1 ]
机构
[1] Huazhong Univ Sci & Technol, Lab Informat Secur, Sch Comp Sci, Wuhan 430074, Peoples R China
基金
中国国家自然科学基金;
关键词
malicious code; behavior monitor; behavior association; pushdown automation;
D O I
10.1109/TST.2014.6919827
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malicious applications can be introduced to attack users and services so as to gain financial rewards, individuals' sensitive information, company and government intellectual property, and to gain remote control of systems. However, traditional methods of malicious code detection, such as signature detection, behavior detection, virtual machine detection, and heuristic detection, have various weaknesses which make them unreliable. This paper presents the existing technologies of malicious code detection and a malicious code detection model is proposed based on behavior association. The behavior points of malicious code are first extracted through API monitoring technology and integrated into the behavior; then a relation between behaviors is established according to data dependence. Next, a behavior association model is built up and a discrimination method is put forth using pushdown automation. Finally, the exact malicious code is taken as a sample to carry out an experiment on the behavior's capture, association, and discrimination, thus proving that the theoretical model is viable.
引用
收藏
页码:508 / 515
页数:8
相关论文
共 15 条
[1]  
Boulif M., INT J COMPUTATIONAL
[2]  
Briand LC, 2003, SPRING INT SER ENG C, V731, P204
[3]  
Cohen F., 1987, Computers & Security, V6, P22, DOI 10.1016/0167-4048(87)90122-2
[4]   Detecting Virus Mutations Via Dynamic Matching [J].
Feng, Min ;
Gupta, Rajiv .
2009 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, CONFERENCE PROCEEDINGS, 2009, :105-114
[5]  
Harrald J. R., 2004, ENG MAN C 2004 P 200, V2, P780
[6]  
Kang Z.-P., 2007, INFORM SECURITY COMM, V2, P145
[7]   GROUPS, THE THEORY OF ENDS, AND CONTEXT-FREE LANGUAGES [J].
MULLER, DE ;
SCHUPP, PE .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1983, 26 (03) :295-310
[8]  
Plicka M., 2011, FED C COMP SCI INF S, P903
[9]  
Porikli F., 2005, IEEE Intl. Conf. Multimedia and Expo, P1234