Font Size: a A A

Malicious Code Take The Initiative To Found A Technology Research

Posted on:2011-01-07Degree:MasterType:Thesis
Country:ChinaCandidate:Z FangFull Text:PDF
GTID:2208360308466170Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Advances in technology and promote computer and Internet technology, and with the economic development and rapid popularity of open, the malicious code has been prepared by the late 20th century a small number of technical computer professional researchers that have the "privilege" of the gradual spread open to, and with the great development of the network, malicious code, the preparation of technology spread like a wildfire, the impact of hazards, losses are increasing. Malicious code writers to get fame from the original for the purpose of the development to the present in order to steal other people's privacy, access to economic benefits for the purpose of. Even now, making malicious code has become a huge underground industry and formed a huge industrial chain. The current malicious code detection software In addition to real-time protection feature to prevent network attacks, for hidden in the computer information systems in a variety of malicious code, and only carrying out a comprehensive scan, or malicious code is activated only when found to produce behavior. Not take the initiative to discover the real-time, and then find the most relevant malicious code for processing. At the same time, the current technology or malicious code was found to signature-based scanning, supplemented by heuristic scanning, behavior detection, supplemented by other detection methods. Emerging computer security agencies have not yet been extracted and added to the signature features of the library's new malicious code detection is not yet very successful. In particular, the malicious code is now used more and more superior technology, malicious code, knowledge of production staff has become increasingly diverse, often with unexpected ideas to prepare them for malicious code, along with the popularization of the network and network in people's to occupy the position of life more and more important, the losses caused by malicious code that is bound to grow.The current method of detection of malicious code or software, the discovery of malicious code, malicious code often has invaded into the machine. Therefore, this paper proposes to change the traditional to scan the disk file or way of detecting the virus scans the memory, changing the network in a computer system out of the entrance through the use of efficient data collection techniques, rather than the common existing data collection programs --- that is, the system built-in data capture function to capture the data, combined with malicious code scanning technology and network attacks reasoning techniques to capture the data on the detection, malicious code, active discovery, and associated processing.Based on the above ideas and technology, this paper,an active found systems for malicious code is designed for malicious code detection. The system can be in the network data into the computer system's network interface on the collection of data and immediate analysis of data whether safe early to judge. In order to malicious code at the first time can be related to treatment.
Keywords/Search Tags:Data collection, the initiative found, malicious code
PDF Full Text Request
Related items