Font Size: a A A

The Research Of Malicious Computer Code's Prevention Based On Signature Analysis

Posted on:2011-01-16Degree:MasterType:Thesis
Country:ChinaCandidate:Z F LiFull Text:PDF
GTID:2178360305450881Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the popularization of computer and network, computer and network become more an more important in people's life. Bringing great convenience, Computers and networks also brought many of threats to people, such as computer viruses, Trojan horses, worms and so on. The threats not only lead to huge economic losses to people, but also threaten national security.How can we ensure computer security would become an unavoidable question presented in front of people. Some computer security technology have been developed, such as antivirus, firewall and so on. One of the key technology is the Prevention and treatment technology based on Signature Analysis, and string pattern matching algorithm is mainly used in this technology. This paper describes the pattern matching algorithm related technologies.First, the paper describes the background of the Prevention and treatment technology based on Signature Analysis and the impact of malicious code to the people's production and lives. from malicious code such as.Second, the paper introduces the classify and dissemination mechanism of malicious code, and several kinds of malicious code prevention and control technologies, such as antivirus software, firewall, group policy, hips and so on.The core of this paper describes several classic algorithms of the Prevention and treatment technology based on Signature Analysis, such as BF algorithm, KPM algorithm, BM algorithm, and analyzes the performance of the algorithm. By applying the three algorithms to the Clamwin,an open source antivirus software. the paper gives the test result, that is about the time performance and space efficiency,running on the local computer.Finally, this paper gives the trends of development of malicious code prevention technology and directions for further research of the author..
Keywords/Search Tags:Signature Analysis, Pattern Matching, Computer Security
PDF Full Text Request
Related items