Font Size: a A A

Research In Active Defense Based On Program Behavior Analysis

Posted on:2011-05-02Degree:MasterType:Thesis
Country:ChinaCandidate:Y F ZhangFull Text:PDF
GTID:2178360302490221Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
This paper describes the status of network security, threats, trends and the focus of the study starting on the current active defense technology ,this paper basic introduction and compare to the various technologies, point out the advantages and disadvantages.Active defense technologies based on program behavior analysis presented in this paper, the system uses a LKM technology to achieve, in contrast to traditional system call access to and on the basis of pretreatment technology, use modify the interrupt vector table to intercept system calls, thus generating a normal program behavior database, while the adoption of improved Boyer-Moore algorithm to accurately analyze program behavior, this algorithm there is the possibility to skip the text sub-strings, you can quickly move, in terms of performance, efficiency, resource consumption have achieved better results. The truth is the active defense technologies based on program behavior analysis has a detection rate of high false positive rate of small features, for an unknown attacker intrusion defense also played a certain role.
Keywords/Search Tags:program behavior, system calls, active defense, intrusion detection
PDF Full Text Request
Related items