Mining method and system for malicious code hiding behaviors

A malicious code and behavior technology, applied in the field of network security, can solve problems such as the lack of effective and active methods to discover the hidden behavior of malicious code, the inability to implement effective analysis of malicious code, and the inability to analyze the path of hidden malicious behavior, so as to improve hidden behavior. The effect of analysis and mining capabilities

Active Publication Date: 2014-05-21
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF5 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The main problems in the current malicious code hiding behavior analysis methods are: dynamic analysis only analyzes the behavior of malicious code execution within a period of time, and it is easy to miss some delayed hidden behaviors; the dynamic analysis process can only analyze the currently executed behavior, and cannot The hidden malicious behavior path that appears only under certain conditions can be effectively analyzed, and the malicious code that detects the operating environment and conditions to hide the malicious behavior cannot be effectively analyzed; most of the dynamic analysis is tracking passive analysis, which lacks effective and active exploration of hidden malicious code. method of behavior

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mining method and system for malicious code hiding behaviors
  • Mining method and system for malicious code hiding behaviors

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention will be further described below through specific embodiments and accompanying drawings.

[0036] Such as figure 1 As shown, the malicious code hiding behavior mining method of the present invention comprises the following steps:

[0037] 1. Monitor and record the instruction information and function information of the dynamic execution of malicious code.

[0038] The invention uses a hardware simulator to dynamically run malicious codes to be analyzed in a virtual operating system, and monitors and records the instructions and function information executed by the malicious codes in the hardware simulator. Instruction monitoring uses the method of disassembly in the intermediate translation module of the hardware simulator to extract instruction by instruction and record the corresponding instruction information. Function information monitoring calculates the corresponding function call address by identifying the system data structure in the virtu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a mining method and system for malicious code hiding behaviors. The method includes the steps that malicious codes are operated in a virtual environment; whether related instructions and functions related with hiding behavior routes are included in instruction information and function information executed by the malicious codes or not is judged; if execution information related with time delay hiding is detected, the malicious codes are made to continuously execute follow-up instructions and functions through ending corresponding time delay behaviors; if execution information related with conditional judgment hiding is detected, the execution information is classified according to conditional judgment, and possible execution routes of the malicious codes are mined through meeting execution conditions of different routes; analyzed various behavior route information executed by the malicious codes is used for generating a malicious code behavior route tree. The malicious code hiding behaviors avoiding analyzing in the modes of time delay hiding and conditional judgment hiding can be effectively mined, the various hiding behavior routes possibly existing are effectively found out, and the capacity for analyzing and mining the malicious code hiding behaviors is improved.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a method and system for mining malicious code hiding behaviors. Background technique [0002] With the continuous advancement of informatization and the continuous development of technology, malicious code technology, one of its important threats, is also constantly improving. In order to avoid analysis and detection, the hiding ability, deformation ability and survivability of malicious code are constantly increasing. Malicious code hides some of its own harmful behaviors through various technical means, so that ordinary analysis and detection tools cannot detect its malicious behaviors in time, thereby causing damage and threatening the security of the Internet and computer systems when necessary. [0003] At present, the means of hiding malicious codes mainly include: (1) hiding its traces in the system, such as process information and so on. (2) It conta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/566
Inventor 王蕊林子敏张道娟
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products