计算机应用 ›› 2010, Vol. 30 ›› Issue (07): 1767-1770.

• 信息安全 • 上一篇    下一篇

基于系统调用踪迹的恶意行为规范生成

孙晓妍1,祝跃飞1,黄茜2,郭宁3   

  1. 1. 解放军信息工程大学信息工程学院七系
    2. 解放军信息工程大学信息工程学院
    3.
  • 收稿日期:2010-01-26 修回日期:2010-03-07 发布日期:2010-07-01 出版日期:2010-07-01
  • 通讯作者: 孙晓妍

Generation of system malicious behavior specification based on system call trace

  • Received:2010-01-26 Revised:2010-03-07 Online:2010-07-01 Published:2010-07-01

摘要: 在对恶意代码的研究上,恶意行为规范的自动生成仍然是一个难题。在基于系统调用踪迹的恶意行为规范生成方法中,已有的图表示方法使用挖掘极小对比子图的生成方法最坏时间复杂度达到了O(N!)。对恶意代码规范的自动生成进行了研究,为降低规范自动生成的复杂度,提出了对程序调用踪迹序列转变为图表示模型的方法,使得最终构建的图的节点减少且标号唯一,恶意行为规范生成的最坏时间复杂度为O(N2)。

关键词: 恶意行为, 规范, 调用踪迹, 极小对比子图

Abstract: On the study of malicious code, the automatic generation of malicious behavior speciation is still a difficult problem. In the field of generation of malicious behavior specification based on system call trace, the existing graph representation uses the minimal contrast subgraph mining method to generate the speciation, but the worst time complexity gets to O(N!). This paper studied the automatic generation method of malicious code specification. In order to reduce the complexity of specification generation, this paper proposed a method to transform the program call traces to a graph representation so that the number of final graph nodes was reduced and the node label was unique, and the worst time complexity of specification generation is O(N2).

Key words: Malicious behavior, Specification, System Call Trace, Minimal Contrast Subgraph