ISSN 0253-2778

CN 34-1054/N

Open AccessOpen Access JUSTC

Intrusion detection approach towards software behavior trustworthiness

Cite this:
https://doi.org/10.3969/j.issn.0253-2778.2011.07.010
  • Received Date: 28 April 2011
  • Rev Recd Date: 23 June 2011
  • Publish Date: 31 July 2011
  • According to the problems of current intrusion detection methods, a new static detection approach towards software behavior trustworthiness was presented. Firstly, software behavior trustworthiness was discussed and defined formally, and was then described with instruction sequences. Secondly, a detection approach and its process were presented. Malicious behavior knowledge obtained through data mining on malware was organized as trustworthiness policy and used to detect and judge unknown software. Thirdly, the approach was implemented and verified by some behavior patterns on chosen samples. The experimental results show that the approach can detect malicious behavior in unknown software with a high success rate.
    According to the problems of current intrusion detection methods, a new static detection approach towards software behavior trustworthiness was presented. Firstly, software behavior trustworthiness was discussed and defined formally, and was then described with instruction sequences. Secondly, a detection approach and its process were presented. Malicious behavior knowledge obtained through data mining on malware was organized as trustworthiness policy and used to detect and judge unknown software. Thirdly, the approach was implemented and verified by some behavior patterns on chosen samples. The experimental results show that the approach can detect malicious behavior in unknown software with a high success rate.
  • loading
  • 加载中

Catalog

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return