计算机科学 ›› 2016, Vol. 43 ›› Issue (Z11): 342-345.doi: 10.11896/j.issn.1002-137X.2016.11A.079

• 信息安全 • 上一篇    下一篇

基于特征阈值的恶意代码快速分析方法

齐法制,孙智慧   

  1. 中国科学院高能物理研究所 北京100049;中国科学院大学 北京100049,中国科学院高能物理研究所 北京100049
  • 出版日期:2018-12-01 发布日期:2018-12-01
  • 基金资助:
    本文受战略性先导科技专项(A类)(XDA100109),国家自然科学基金项目(11305196),中科院青年创新促进会(29201431231100102)资助

Rapid Analysis Method of Malicious Code Based on Feature Threshold

QI Fa-zhi and SUN Zhi-hui   

  • Online:2018-12-01 Published:2018-12-01

摘要: 当前恶意代码具有种类多、危害大、复杂程度高、需要的应急响应速度快等特点,针对现有恶意代码分析方法难以适应现场快速分析处置与应用实践的需求的问题,研究了基于特征阈值的恶意代码分析方法,构建了恶意代码快速分析处置的具体环节,包括环境分析、文件细化、静态分析、动态分析,并通过构建的阈值判断来定位代码的功能和家族属性,并给出清除恶意代码的具体方法。实际应用结果证明,此方法对恶意代码安全特性相关的意图、功能、结构、行为等因素予以综合,实现在现场处置层面上对恶意代码安全性的分析研究,为当前网络安全恶意代码的现场快速响应和处置提供了重要支撑。

关键词: 信息安全,恶意代码,现场处置,阈值分析,快速处置

Abstract: Nowadays,malicious code has many characteristics,such as multiple types,harm,high complex and needing fast response to handle it.Because the existing method for the analysis of malicious code is difficult to adapt to rapidly analyzing and disposing at the scene and the needs of application practice,this paper proposed the analysis method of malicious code based on feature threshold and constructed the details of the rapid analysis and disposal of malicious code.It contains the environmental analysis,file refinement,static analysis and dynamic analysis.By constructing the threshold determination,locating the function and family properties of code,we provided the specific method of removing the malicious code.The result of practical application proves that this method combines intention,function,structure and behavior of malicious code,and realizes the research about the analysis of the security of malicious code at the level of the disposal site.It provides important support for the fast response and disposal of the current network security of malicious code.

Key words: Information security,Malicious code,Site disposal,Threshold analysis,Rapid disposal

[1] Branco R R,Shamir U.Architecture for automation of malware analysis[C]∥The 5th International Conference on Malicious and Un-wanted Software (MALWARE).2010:106-112
[2] Egele M,Scholte T,Kirda E,et al.A survey on automated dynamic malware-analysis techniques and tools[J].ACM Computing Surveys (CSUR),2012,44(2):1-42
[3] Sathyanarayan V S,Kohli P,Bruhadeshwar B.Signature generation and detection of malware families[C]∥Information Secu-rity and Privacy.2008:336-349
[4] Staish S,Pereira S.Behavioral Signature Generation Using Clustering:WIPO Patent 2011137083[P].2011
[5] http://www.m86security.com/newsimages/trace/Marshal8e6_TRACE_Report_July_2015.pdf

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!