4 research outputs found

    ΠžΠ±Π½Π°Ρ€ΡƒΠΆΠ΅Π½ΠΈΠ΅ ΠΈ идСнтификация врСдоносных исполняСмых ΠΏΡ€ΠΎΠ³Ρ€Π°ΠΌΠΌΠ½Ρ‹Ρ… ΠΌΠΎΠ΄ΡƒΠ»Π΅ΠΉ с ΠΏΠΎΠΌΠΎΡ‰ΡŒΡŽ ΠΌΠ΅Ρ‚ΠΎΠ΄ΠΎΠ² Data Mining

    Get PDF
    The paper touches on the problem of improving vital characteristics of Data Mining - based systems responsible for detecting and identifying malicious executable binaries (malware). The common structure of learning and operating procedures for such systems is defined. The main non-functional requirements to the systems are specified on this structure's basis. The research's task is formulated as a look for a new, efficient representatin models for executable binaries. The models are to give compact, informative description vectors for such file objects. The essence of suggested approaches is expounded: the first one is focused on malware detection and based on positionally-dependent static data; the second uses dynamic low-level execution data for malware identification. The architecture of the developed system is represented as well as validation results for the developed representation models.ИсслСдованиС Π·Π°Ρ‚Ρ€Π°Π³ΠΈΠ²Π°Π΅Ρ‚ ΠΏΡ€ΠΎΠ±Π»Π΅ΠΌΡƒ ΡƒΠ»ΡƒΡ‡ΡˆΠ΅Π½ΠΈΡ основных характСристик систСм обнаруТСния ΠΈ ΠΈΠ΄Π΅Π½Ρ‚ΠΈΡ„ΠΈΠΊΠ°Ρ†ΠΈΠΈ врСдоносных исполняСмых Ρ„Π°ΠΉΠ»ΠΎΠ² Π½Π° основС ΠΌΠ΅Ρ‚ΠΎΠ΄ΠΎΠ² Data Mining. ΠžΠΏΡ€Π΅Π΄Π΅Π»ΡΠ΅Ρ‚ΡΡ общая структура процСссов построСния ΠΈ эксплуатации систСм Π΄Π°Π½Π½ΠΎΠ³ΠΎ класса. На Π΅Π΅ основС уточняСтся ΠΏΠ΅Ρ€Π΅Ρ‡Π΅Π½ΡŒ Π½Π΅Ρ„ΡƒΠ½ΠΊΡ†ΠΈΠΎΠ½Π°Π»ΡŒΠ½Ρ‹Ρ… Ρ‚Ρ€Π΅Π±ΠΎΠ²Π°Π½ΠΈΠΉ ΠΊ ΠΏΠΎΠ΄ΠΎΠ±Π½Ρ‹ΠΌ систСмам. Π—Π°Π΄Π°Ρ‡Π° Ρ€Π°Π±ΠΎΡ‚Ρ‹ опрСдСляСтся Π² Π²ΠΈΠ΄Π΅ поиска эффСктивных ΠΌΠΎΠ΄Π΅Π»Π΅ΠΉ прСдставлСния исполняСмых ΠΎΠ±ΡŠΠ΅ΠΊΡ‚ΠΎΠ², ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡŽΡ‰ΠΈΡ… ΠΏΠΎΠ»ΡƒΡ‡Π°Ρ‚ΡŒ ΠΊΠΎΠΌΠΏΠ°ΠΊΡ‚Π½Ρ‹Π΅ ΠΈ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ‚ΠΈΠ²Π½Ρ‹Π΅ Π²Π΅ΠΊΡ‚ΠΎΡ€Π° описаний Π°Π½Π°Π»ΠΈΠ·ΠΈΡ€ΡƒΠ΅ΠΌΡ‹Ρ… ΠΎΠ±ΡŠΠ΅ΠΊΡ‚ΠΎΠ². Π˜Π·Π»Π°Π³Π°Π΅Ρ‚ΡΡ ΡΡƒΡ‚ΡŒ ΠΏΡ€Π΅Π΄Π»Π°Π³Π°Π΅ΠΌΡ‹Ρ… ΠΏΠΎΠ΄Ρ…ΠΎΠ΄ΠΎΠ² ΠΊ ΠΎΠ±Π½Π°Ρ€ΡƒΠΆΠ΅Π½ΠΈΡŽ ΠΈ Π²Ρ‹ΡΠ²Π»Π΅Π½ΠΈΡŽ врСдоносных ΠΏΡ€ΠΎΠ³Ρ€Π°ΠΌΠΌ Π½Π° основС статичСской ΠΏΠΎΠ·ΠΈΡ†ΠΈΠΎΠ½Π½ΠΎ-зависимой ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΈ ΠΈ Π½ΠΈΠ·ΠΊΠΎΡƒΡ€ΠΎΠ²Π½Π΅Π²Ρ‹Ρ… динамичСских ΠΏΡ€ΠΈΠ·Π½Π°ΠΊΠΎΠ². ΠŸΡ€Π΅Π΄ΡΡ‚Π°Π²Π»ΡΠ΅Ρ‚ΡΡ Π°Ρ€Ρ…ΠΈΡ‚Π΅ΠΊΡ‚ΡƒΡ€Π° Ρ€Π°Π·Ρ€Π°Π±ΠΎΡ‚Π°Π½Π½ΠΎΠΉ систСмы выявлСния врСдоносных ΠΏΡ€ΠΎΠ³Ρ€Π°ΠΌΠΌ ΠΈ Ρ€Π΅Π·ΡƒΠ»ΡŒΡ‚Π°Ρ‚Ρ‹ практичСской ΠΏΡ€ΠΎΠ²Π΅Ρ€ΠΊΠΈ Ρ€Π°Π·Ρ€Π°Π±ΠΎΡ‚Π°Π½Π½Ρ‹Ρ… ΠΌΠΎΠ΄Π΅Π»Π΅ΠΉ прСдставлСния

    Анализ ΠΈ классификация ΠΌΠ΅Ρ‚ΠΎΠ΄ΠΎΠ² обнаруТСния сСтСвых Π°Ρ‚Π°ΠΊ

    Get PDF
    Different methods of detection of network attacks are considered in the paper. The paper focuses on the construction of the generalized classification scheme of methods of network attack detection, description of each of the above methods and their comparative analysis within the proposed classification scheme.Π’ Ρ€Π°Π±ΠΎΡ‚Π΅ Ρ€Π°ΡΡΠΌΠ°Ρ‚Ρ€ΠΈΠ²Π°ΡŽΡ‚ΡΡ Ρ€Π°Π·Π»ΠΈΡ‡Π½Ρ‹Π΅ ΠΌΠ΅Ρ‚ΠΎΠ΄Ρ‹ обнаруТСния сСтСвых Π°Ρ‚Π°ΠΊ. ОсновноС Π²Π½ΠΈΠΌΠ°Π½ΠΈΠ΅ удСляСтся ΠΏΠΎΡΡ‚Ρ€ΠΎΠ΅Π½ΠΈΡŽ ΠΎΠ±ΠΎΠ±Ρ‰Π΅Π½Π½ΠΎΠΉ классификационной схСмы ΠΌΠ΅Ρ‚ΠΎΠ΄ΠΎΠ² обнаруТСния сСтСвых Π°Ρ‚Π°ΠΊ, ΠΏΡ€Π΅Π΄ΡΡ‚Π°Π²Π»Π΅Π½ΠΈΡŽ сущности ΠΊΠ°ΠΆΠ΄ΠΎΠ³ΠΎ ΠΈΠ· рассмотрСнных ΠΌΠ΅Ρ‚ΠΎΠ΄ΠΎΠ² ΠΈ ΠΈΡ… ΡΡ€Π°Π²Π½ΠΈΡ‚Π΅Π»ΡŒΠ½ΠΎΠΌΡƒ Π°Π½Π°Π»ΠΈΠ·Ρƒ Π² Ρ€Π°ΠΌΠΊΠ°Ρ… ΠΏΡ€Π΅Π΄Π»ΠΎΠΆΠ΅Π½Π½ΠΎΠΉ классификационной схСмы

    Analysis And Classification Of Methods For Network Attack Detection

    Get PDF
    Different methods of detection of network attacks are considered in the paper. The paper focuses on the construction of the generalized classification scheme of methods of network attack detection, description of each of the above methods and their comparative analysis within the proposed classification scheme.24520724414-07-00417, RFBR, Russian Foundation for Basic Research14-07-00697, RFBR, Russian Foundation for Basic Research15-07-07451, RFBR, Russian Foundation for Basic Research16-29-09482, RFBR, Russian Foundation for Basic Research16-37-00338, RFBR, Russian Foundation for Basic Researc

    An integrated malware detection and classification system

    Full text link
    This thesis is to develop effective and efficient methodologies which can be applied to continuously improve the performance of detection and classification on malware collected over an extended period of time. The robustness of the proposed methodologies has been tested on malware collected over 2003-2010.<br /
    corecore