期刊文献+

Detecting Hidden Malware Method Based on "In-VM" Model 被引量:2

“In-VM”模型的隐藏代码检测模型(英文)
下载PDF
导出
摘要 Security tools are rapidly developed as network security threat is becoming more and more serious.To overcome the fundamental limitation of traditional host-based anti-malware system which is likely to be deceived and attacked by malicious codes,VMM-based anti-malware systems have recently become a hot research field.In this article,the existing malware hiding technique is analyzed,and a detecting model for hidden process based on "In-VM" idea is also proposed.Based on this detecting model,a hidden process detection technology which is based on HOOK SwapContext on the VMM platform is also implemented successfully.This technology can guarantee the detecting method not to be attacked by malwares and also resist all the current process hiding technologies.In order to detect the malwares which use remote injection method to hide themselves,a method by hijacking sysenter instruction is also proposed.Experiments show that the proposed methods guarantee the isolation of virtual machines,can detect all malware samples,and just bring little performance loss. Security tools are rapidly developed as network security threat is becoming more and more serious.To overcome the fundamental limitation of traditional host-based anti-malware system which is likely to be deceived and attacked by malicious codes,VMM-based anti-malware systems have recently become a hot research field.In this article,the existing malware hiding technique is analyzed,and a detecting model for hidden process based on 'In-VM' idea is also proposed.Based on this detecting model,a hidden process detection technology which is based on HOOK SwapContext on the VMM platform is also implemented successfully.This technology can guarantee the detecting method not to be attacked by malwares and also resist all the current process hiding technologies.In order to detect the malwares which use remote injection method to hide themselves,a method by hijacking sysenter instruction is also proposed.Experiments show that the proposed methods guarantee the isolation of virtual machines,can detect all malware samples,and just bring little performance loss.
机构地区 Computer School
出处 《China Communications》 SCIE CSCD 2011年第4期99-108,共10页 中国通信(英文版)
基金 National High Technical Research and Development Program of China(863 Program)under Grant No. 2008AA01Z414
关键词 network security Virtual Machine Monitor(VMM) malware detection hidden process hardware virtualization network security Virtual Machine Monitor(VMM) malware detection hidden process hardware virtualization
  • 相关文献

参考文献23

  • 1李伟,苏璞睿.基于内核驱动的恶意代码动态检测技术[J].中国科学院研究生院学报,2010,27(5):695-703. 被引量:9
  • 2SHARIF M,LEE W,CUI W,LANZI A.Secure In-VM Mo- nitoring Using Hardware Virtualization. Proceedings of the 16th ACM Conference on Computer and Communications Security . 2009 被引量:1
  • 3CNCERT/CC.The 26thChina Internet Development Statistics report. . 2010 被引量:1
  • 4WEN Yan.Research on the Key Technologies of Isolated Ex- ecution Environment. . 2008 被引量:1
  • 5PAYNE B D,CARBONE M,LEE W.Secure and Flexible Monitoring of Virtual Machines. Proceedings of the 23rd Annual Computer Security Applications Conference . 2007 被引量:1
  • 6MAO Decao.Windows Kernel Analysis. . 2009 被引量:1
  • 7Intel Corporation.Intel 64 and IA-32 Architectures Soft- ware Developer’’’’s Manual Volume 3B: System Programming Guide,Part 2. . 2009 被引量:1
  • 8Intel Corporation.Intel 64 and IA-32 Architectures Soft- ware Developer’’’’s Manual Volume 3A: System Programming Guide,Part 1. . 2009 被引量:1
  • 9GOLDBERG R P.Architecture of Virtual Machines. Proceedings of the Workshop on Virtual Computer Systems . 1973 被引量:1
  • 10IAN P,KEIR F,STEVE H,et al.Xen 3.0 and the Art ofVirtualization. Proceedings of the Ottawa Linux Sym- posium . 2005 被引量:1

二级参考文献16

  • 1(美)KeithBrown著,刘涛,李一舟.Windows安全性编程[M]中国电力出版社,2004. 被引量:1
  • 2(美)[J.里克特]JeffreyRichter著,王建华等.Windows核心编程[M]机械工业出版社,2000. 被引量:1
  • 3Robert K.Three ways to Inject Your Code into Another Process. http://www.codeguru.com/Cpp/W-P/system/processesmodules/article.php/c5767 . 2009 被引量:1
  • 4Rattle.Using process infection to bypass Windows software firewalls phrack[R/OL]. http://www.phrack.org/show.php?p=62&a=13 . 2004 被引量:1
  • 5Matt P.Learn system-level Win32coding techniques by writing and API spy program. Microsoft Systems Journal . 1994 被引量:1
  • 6Matt P.Under the Hood. Microsoft Systems Journal . 1997 被引量:1
  • 7Holy_F.Technics of hooking API functions on Windows[R/OL]. http://www.hxdef.org . 2002 被引量:1
  • 8Crazyload.Playing with Windows/dev/(k)mem. Phrack . 2002 被引量:1
  • 9Tan CK.Defeating Kernel Native API Hookers by Direct Service dispatch Table Restoration. http://www.security.org.sg . 2004 被引量:1
  • 10Nguyen,Reiher N,Kuenning P,et al.Detecting insider threats by monitoring system call activity. Information Assurance Workshop,IEEE Systems,Man and Cybernetics Society . 2003 被引量:1

共引文献8

同被引文献31

  • 1郑康锋,王秀娟,杨义先,郭世泽.Detecting DDoS Attack With Hilbert-Huang Transformation[J].China Communications,2011,8(2):126-133. 被引量:1
  • 2朱维军,王忠勇,张海宾.Intrusion Detection Algorithm Based on Model Checking Interval Temporal Logic[J].China Communications,2011,8(3):66-72. 被引量:5
  • 3易平,吴越,陈佳霖.Towards an Artificial Immune System for Detecting Anomalies in Wireless Mesh Networks[J].China Communications,2011,8(3):107-117. 被引量:3
  • 4STIBOR T, TIMMIS J, ECKERT C. A Comparative Study Of Real-Valued Negative Selection To Statistical Anomaly Detection Techniques [C]// Proceedhags of the 4th Interna- tional Conference On Artificial Immune Systems. Springer, 2005: 262-275. 被引量:1
  • 5GREENSMITH J, AICKELIN U, CAYZER S. Introducing Dendritic Cells As a Novel Immune-Inspked Algorithm for Anomaly Detection[C]//Proceedings of ICARIS-05. LNCS 3627, 2005: 153-167. 被引量:1
  • 6GREENSMITH J, TWYCROSS J, AICKELIN U. Dendritic Cells for Anomaly Detection[C]//Proceedings of the IEEE Congress on Evolutionary Computation (CEC 2006), Van- couver, BC. IEEE Press, 2006: 664-671. 被引量:1
  • 7AL-HAMMADI Y, AICKELIN U, GREENSMITH J. DCA for Bot Detection[C]//Proceedings of the IEEE World Con- gress on Computational Intelligence (WCCI2008): July 1-6, 2008, Hong Kong. IEEE Press, 2008: 1807-1816. 被引量:1
  • 8GU Feng, GREENSMITH J, AICKELIN U. Integrating Re- al-Time Analysis With The Dendritic Cell Algorithm Through Segmentation[C]//Proceedings of the 11 th Annual conference on Genetic and evolutionary computation (GECCO'2009): July 8-12, 2009, Montreal, QC, Canada. ACM Press, 2009: 1203-1210. 被引量:1
  • 9AL-HAMMADI Y, AICKELIN U, GREENSMITH J. Per- formance Evaluation of DCA and SRC on a Single Bot De- tection[J]. Journal of Information Assurance and Security, 2010, 2010(5): 303-313. 被引量:1
  • 10TWYCROSS J, AICKELIN U, AMANDA M. Detecting A- nomalous Process Behaviour using Second Generation Arti-ficial Immune Systems[J]. International Journal of Uncon- ventional Computing, 2010, 6(3-4): 301-326. 被引量:1

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部