基于P2P的惡意代碼檢測及防御技術(shù)研究
[Abstract]:With the development of information technology, various forms of malicious code are increasing, and now it has penetrated into every aspect of our life. Most of the existing security software relies on the support of servers to update the virus library, and these security software has always been concerned about stealing users' privacy data. In order to solve these problems, this paper combines P2P technology with malicious code detection and defense technology, and establishes a new mechanism to combat malicious code. The research includes three parts: detection, defense and response, in which the detection technology is like a spear, the defense technology is like a shield, and the response network is a warrior who uses a spear and shield to fight. These three parts complement each other and are indispensable to each other. The key technology of detection includes two points. The first point is distributed code behavior monitoring, which distributes the code monitoring to one node in P2P network, and each node cooperates with each other to "fight". The second point is the challenge test for malicious code. In order to detect the malicious code in latent period, the challenge test is used to expose the true face of malicious code as soon as possible. The key technology of defense consists of three parts. The first part is static data scanning. Compared with general scanning, the scanning based on data difference is more efficient and avoids a lot of repeated and useless scans. The second part is dynamic data protection. According to the result of response network analysis of malicious code, we can decide where to protect, and then take important index to protect it at different levels. The third part is automatic repair, on the one hand, the version is traced back by recording the modified differential data such as files, on the other hand, it is repaired by using the distributed data in P2P network. An automatic fix can be performed by creating a PDP-outer, that does not depend on the operating system to run, even if the operating system crashes. The key technologies of response include the construction of P2P-based basic network and the identification and processing of malicious code. Response network is composed of P2P network which contains many nodes. It can guarantee the security of basic network through node authentication protocol, data transmission protocol, credibility and other security mechanisms. It is the premise of malicious code to identify and process data by synchronizing distributed data on each node to ensure the consistency of data such as black list and white list. The nodes in the behavior monitoring response network can generate the behavior log and so on. In this paper, several methods including neural network are discussed to process these data, and then the autonomous learning and decision-making are carried out. After more than a year of research and experiments, many research results have been achieved in this subject, including the following three aspects: 1. In this paper, a new malicious code detection and defense method is proposed, which solves the problem of relying on the update of server. Because it is central and open source, it solves the problem that privacy data can be stolen; 2. In order to compare the detection and defense methods proposed in this paper with the general methods, a simulation verification program is developed, which can simulate the process of antagonism between security software and malicious code. In this paper, we apply for an invention patent based on the detection and defense method proposed in this paper, a malicious code detection and defense method, which is in the state of acceptance at present.
【學(xué)位授予單位】:電子科技大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2014
【分類號】:TP393.08
【共引文獻】
相關(guān)期刊論文 前10條
1 秦磊磊;李素媛;陳聰;張三元;;宜昌地區(qū)大米中鎘含量的調(diào)查研究[J];現(xiàn)代農(nóng)業(yè)科技;2011年17期
2 唐燕玉;;幾個不等式的概率函數(shù)證明方法[J];安慶師范學(xué)院學(xué)報(自然科學(xué)版);2010年04期
3 梁巧萍,劉昕;印刷畫面的色差分析[J];包裝工程;2005年03期
4 范興華;戴美鳳;;獨立學(xué)院概率統(tǒng)計教學(xué)的實踐與研究[J];赤峰學(xué)院學(xué)報(自然科學(xué)版);2010年09期
5 韓偉;;概率統(tǒng)計教學(xué)研究[J];赤峰學(xué)院學(xué)報(自然科學(xué)版);2012年06期
6 程靖;;概率統(tǒng)計教學(xué)方法的幾點體會[J];巢湖學(xué)院學(xué)報;2012年03期
7 姚道洪;楊德志;;隨機事件的獨立性淺析[J];長江大學(xué)學(xué)報(自然科學(xué)版);2011年10期
8 伍億;;試題和成績分析及程序?qū)崿F(xiàn)[J];重慶電子工程職業(yè)學(xué)院學(xué)報;2010年05期
9 沈永梅;丁衛(wèi)林;;全概率公式與貝葉斯公式的教學(xué)方法研究[J];時代教育(教育教學(xué));2010年05期
10 劉煥香;;概率論與數(shù)理統(tǒng)計課程的教學(xué)探索[J];時代教育(教育教學(xué));2010年09期
相關(guān)會議論文 前3條
1 劉欣;;淺談貝葉斯公式的一種教學(xué)設(shè)計[A];第九屆沈陽科學(xué)學(xué)術(shù)年會論文集[C];2012年
2 牟瑞芳;;系統(tǒng)風險理論的基本問題[A];風險分析和危機反應(yīng)的創(chuàng)新理論和方法——中國災(zāi)害防御協(xié)會風險分析專業(yè)委員會第五屆年會論文集[C];2012年
3 黃文生;招偉文;楊云茜;;近50年順德氣象災(zāi)害特征分析[A];第32屆中國氣象學(xué)會年會S6 應(yīng)對氣候變化、低碳發(fā)展與生態(tài)文明建設(shè)[C];2015年
相關(guān)博士學(xué)位論文 前10條
1 李蓮芝;汽車變速箱質(zhì)量問題追溯的理論方法研究[D];吉林大學(xué);2011年
2 游源;MPT建模方法研究及其應(yīng)用[D];華中科技大學(xué);2011年
3 呂敬亮;幾類隨機生物種群模型性質(zhì)的研究[D];哈爾濱工業(yè)大學(xué);2011年
4 張俊;迷宮流道灌水器水力與抗堵性能評價及結(jié)構(gòu)優(yōu)化研究[D];西安交通大學(xué);2009年
5 孟祥印;飛行甲板總布置設(shè)計中的若干問題研究[D];哈爾濱工程大學(xué);2011年
6 徐馳;基于摩擦力在線測量的化學(xué)機械拋光終點檢測技術(shù)研究[D];大連理工大學(xué);2011年
7 金曉軍;雙相不銹鋼管道焊接質(zhì)量控制和安全評定的研究[D];天津大學(xué);2004年
8 劉少東;星載有限電掃描天線的研究[D];西安電子科技大學(xué);2005年
9 馬震;游客感知景區(qū)服務(wù)質(zhì)量評價研究[D];西北大學(xué);2010年
10 林峗;論糧食供求與糧食補貼[D];中共中央黨校;2010年
相關(guān)碩士學(xué)位論文 前10條
1 曲福娣;基于點估計法的電力系統(tǒng)隨機潮流計算方法[D];東北電力大學(xué);2011年
2 韓曉明;基于ISO/IEC18000-6 Class C RFID閱讀器數(shù)字系統(tǒng)設(shè)計[D];電子科技大學(xué);2011年
3 付明明;基于PCI總線的數(shù)據(jù)采集系統(tǒng)設(shè)計與實現(xiàn)[D];河北科技大學(xué);2011年
4 黃靜;山東省主要作物灌溉定額研究[D];山東農(nóng)業(yè)大學(xué);2011年
5 賈松松;基于排隊論的港口最佳錨位數(shù)研究[D];大連海事大學(xué);2011年
6 吳坎坷;客船樓梯處人員疏散模型研究[D];大連海事大學(xué);2011年
7 侯海蘇;河南省高新技術(shù)產(chǎn)業(yè)發(fā)展研究[D];山西財經(jīng)大學(xué);2011年
8 陳慕杰;模糊網(wǎng)絡(luò)進度計劃技術(shù)及風險研究[D];河北工程大學(xué);2011年
9 呂東;無線傳感網(wǎng)不同拓撲結(jié)構(gòu)的時間同步算法研究[D];遼寧大學(xué);2011年
10 劉建樹;高速列車轉(zhuǎn)向架構(gòu)架頻域疲勞壽命研究[D];西南交通大學(xué);2011年
,本文編號:2458658
本文鏈接:http://www.wukwdryxk.cn/guanlilunwen/ydhl/2458658.html