期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
基于可疑行为识别的PE病毒检测方法 被引量:6
1
作者 王成 庞建民 +1 位作者 赵荣彩 王强 《计算机工程》 CAS CSCD 北大核心 2009年第15期132-134,共3页
针对当前PE病毒难以防范及查杀的现象,对PE病毒关键技术进行分析,提取病毒典型特征的可疑行为,在此基础上提出一种Windows平台下的静态检测方法。该方法在对程序反编译处理的基础上,以指令序列与控制流图的分析为行为识别依据,完成基于... 针对当前PE病毒难以防范及查杀的现象,对PE病毒关键技术进行分析,提取病毒典型特征的可疑行为,在此基础上提出一种Windows平台下的静态检测方法。该方法在对程序反编译处理的基础上,以指令序列与控制流图的分析为行为识别依据,完成基于可疑行为识别的病毒检测方法的设计。实验结果证明,该检测方法能有效检测混淆变换病毒。 展开更多
关键词 PE病毒 可疑行为 指令序列 控制流图
下载PDF
Recognition of suspicious behavior using case-based reasoning 被引量:2
2
作者 夏利民 杨宝娟 涂宏斌 《Journal of Central South University》 SCIE EI CAS CSCD 2015年第1期241-250,共10页
A novel method case-based reasoning was proposed for suspicious behavior recognition. The method is composed of three departs: human behavior decomposition, human behavior case representation and case-based reasoning.... A novel method case-based reasoning was proposed for suspicious behavior recognition. The method is composed of three departs: human behavior decomposition, human behavior case representation and case-based reasoning. The new approach was proposed to decompose behavior into sub-behaviors that are easier to recognize using a saliency-based visual attention model. New representation of behavior was introduced, in which the sub-behavior and the associated time characteristic of sub-behavior were used to represent behavior case. In the process of case-based reasoning, apart from considering the similarity of basic sub-behaviors,order factor was proposed to measure the similarity of a time order among the sub-behaviors and span factor was used to measure the similarity of duration time of each sub-behavior, which makes the similarity calculations more rational and comprehensive.Experimental results show the effectiveness of the proposed method in comparison with other related works and can run in real-time for the recognition of suspicious behaviors. 展开更多
关键词 visual attention mode case-based reasoning suspicious behavior order factor span factor
下载PDF
基于大数据的重要设施智能预警系统研究 被引量:1
3
作者 吴晓尉 王晨耀 《四川警察学院学报》 2020年第6期80-85,共6页
大数据条件下,综合利用各种社会感知数据、公安业务等数据信息,针对重要设施潜在威胁进行分析,及时发现作案苗头并进行实时化、智能化预警和预控,是信息化时代确保重要设施安全的有效途径。根据前端实时预警和后台信息研判相结合的预警... 大数据条件下,综合利用各种社会感知数据、公安业务等数据信息,针对重要设施潜在威胁进行分析,及时发现作案苗头并进行实时化、智能化预警和预控,是信息化时代确保重要设施安全的有效途径。根据前端实时预警和后台信息研判相结合的预警系统设计思想,在确定预警系统建设目标、功能及组成基础上,可构建可疑人员、可疑物品、可疑事件、风险事件等预警模型。其系统技术架构由感知层、数据层、预警分析层、应用层等要素组成。系统实现的关键技术包括并行处理、深度学习、信息融合等。系统应用中应成立重要设施预警指挥小组,建立预警应急处置联动机制,建立、健全预警法制。 展开更多
关键词 重要设施 可疑行为 风险事件 智能预警
下载PDF
Fuzzy Logic Based UAV Suspicious Behavior Detection
4
作者 Sun Rui Zhang Yucheng Hu Minghua 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI CSCD 2016年第6期-,共5页
In recent years,unmanned air vehicles(UAVs)are widely used in many military and civilian applications.With the big amount of UAVs operation in air space,the potential security and privacy problems are arising.This can... In recent years,unmanned air vehicles(UAVs)are widely used in many military and civilian applications.With the big amount of UAVs operation in air space,the potential security and privacy problems are arising.This can lead to consequent harm for critical infrastructure in the event of these UAVs being used for criminal or terrorist purposes.Therefore,it is crucial to promptly identify the suspicious behaviors from the surrounding UAVs for some important regions.In this paper,a novel fuzzy logic based UAV behavior detection system has been presented to detect the different levels of risky behaviors of the incoming UAVs.The heading velocity and region type are two input indicators proposed for the risk indicator output in the designed fuzzy logic based system.The simulation has shown the effective and feasible of the proposed algorithm in terms of recall and precision of the detection.Especially,the suspicious behavior detection algorithm can provide a recall of 0.89 and a precision of 0.95 for the high risk scenario in the simulation. 展开更多
关键词 UAV suspicious behavior detection fuzzy logic decision making
下载PDF
Web Threats Detection and Prevention Framework
5
作者 Osama M. Rababah Ahmad K. Al Hwaitat +2 位作者 Saher Al Manaseer Hussam N. Fakhouri Rula Halaseh 《Communications and Network》 2016年第3期170-178,共9页
The rapid advancement in technology and the increased number of web applications with very short turnaround time caused an increased need for protection from vulnerabilities that grew due to decision makers overlookin... The rapid advancement in technology and the increased number of web applications with very short turnaround time caused an increased need for protection from vulnerabilities that grew due to decision makers overlooking the need to be protected from attackers or software developers lacking the skills and experience in writing secure code. Structured Query Language (SQL) Injection, cross-site scripting (XSS), Distributed Denial of service (DDos) and suspicious user behaviour are some of the common types of vulnerabilities in web applications by which the attacker can disclose the web application sensitive information such as credit card numbers and other confidential information. This paper proposes a framework for the detection and prevention of web threats (WTDPF) which is based on preventing the attacker from gaining access to confidential data by studying his behavior during the action of attack and taking preventive measures to reduce the risks of the attack and as well reduce the consequences of such malicious action. The framework consists of phases which begin with the input checking phase, signature based action component phase, alert and response phases. Additionally, the framework has a logging functionality to store and keep track of any action taking place and as well preserving information about the attacker IP address, date and time of the attack, type of the attack, and the mechanism the attacker used. Moreover, we provide experimental results for different kinds of attacks, and we illustrate the success of the proposed framework for dealing with and preventing malicious actions. 展开更多
关键词 SQL Injection XSS DDoS Attack suspicious User behavior Web Applications
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部