Font Size: a A A

Research On FAHP Adjudgement Algorithm Based On The Behavior Of Trojan

Posted on:2017-07-21Degree:MasterType:Thesis
Country:ChinaCandidate:H L LiuFull Text:PDF
GTID:2348330518470772Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the rapid development and the widespread popularization of computer technology and Internet, computer viruses, worms, Trojans and other malicious programs full of tricks,appeared frequently, which makes people enjoy rich Internet resources for their own computer security worries. Every year, the malicious program caused economic losses and political influence should not be underestimated. Detection and analysis of the malware has become an urgent problem to be solved in the field of network security.The existing of malware detection and harm of analysis method, mostly designed for the virus and worm which were widely used such as: Bayesian algorithm, artificial immune algorithm, neural network algorithm classification algorithm. Due to the lack of consideration of Trojan characteristics, these methods of hazard adjudgement to the Trojan is not perfect. The introduction of behavioral analysis technology, the most powerful Trojan malicious code for this harm were detected, and analyze quantitatively the harmfulness is imperative. The according to the analysis of Trojan behavior, this paper analyzes the relationship of all kinds of behavior characteristics and the harm of the behaviors and characteristics of Trojan, and to analyze the different behavior characteristics of the harm of Trojan, in a variety of behavioral of qualitative and quantitative analysis and more important,this article is for the harm of Trojan analysis research. Based on the fuzzy analytic hierarchy process, a Trojan critical algorithm is designed and implemented.First of all, this paper summarized and analyzed the common attack techniques and the behavior characteristics of Trojan horse. The Trojan life cycle, in accordance with the loading process, start up process and communication process stage through the working principle and the work process of Trojan which is given. Secondly, through the Trojan behavior features of acquisition, using the method of mathematical analysis, compared with the levels of Trojan behavior that had been distributed. Through different Trojan program corresponding to the different behavior, under the premise of the hazard of different, judging the harm of Trojan. Mainly uses the method of fuzzy analytic hierarchy process (AHP),triangle fuzzy number complementary judgment matrix, the establishment of possibility degree matrix, calculated and the behavior characteristics of the weights between the various levels of the weight of the total taxis of hierarchy. Establish a set of evaluation.According to the characteristics of behavior and for some dependence and frequency of occurrence to calculate the Trojan program ultimately harms score divided criticality. Finally,the algorithm testing and result analysis of the calculated results are in accordance with the results of other methods of comparison, demonstrated in this paper that the conclusion is reliable and expert opinion consistent and in with the confidentiality requirements of the project can be applied.
Keywords/Search Tags:Trojan analysis, Behavior characteristics, Fuzzy AHP, Possibility degree matrix
PDF Full Text Request
Related items