Elsevier

Information Processing Letters

Volume 117, January 2017, Pages 19-24
Information Processing Letters

Research on dynamic heuristic scanning technique and the application of the malicious code detection model

https://doi.org/10.1016/j.ipl.2016.06.014Get rights and content

Highlights

  • This paper investigates the heuristic scanning technique.

  • The minimum distance classifier and detection model were proposed through analysis of the malicious code.

  • This model can identify unknown feature codes of illegal procedures.

Abstract

With the rapid development of computer technology, people pay more attention to the security of computer data and the computer virus has become a chief threat to computer data security. By using an antivirus system that can identify randomly generated computer viruses and on the basis of the basic characteristics of the computer code, this paper investigates the heuristic scanning technique. This paper proposes the minimum distance classifier and detection model through the analysis of the malicious code. This model can identify unknown feature codes of illegal procedures and construct a healthy network environment by using a combination of model and experimental method, which can intercept the illegal virus program in the installation and operation stages.

Introduction

The rapid development of the network has brought the world within the scope of information sharing, which has significantly changed people's output and lifestyle. With the wide use of network in finance, defense, education, and other fields, there have also emerged several unsafe factors for network users. Network security has become a major issue in the process of the development of human social information. Therefore, the research on malicious code significantly contributes to improve network security.

There are several types of research on the malicious code detection technology such as the linkage of the firewall and intrusion detection technology, active defense technology, static signature detection technology, and behavior analysis technology [1]. Among them, the main technology is the behavior analysis technology, which can detect the signature of unknown illegal procedures. Furthermore, it is advantageous as it can minimize the behavior analysis. Johannes Kinder and coworkers described the malicious code by using the method of computer tree logic (CTL), and through the abstract generalization of CNF, this method has a good effect on proactive inspection, but the method can be transferred only through a level of assembly instructions. Zhangboyun used Naive Bayes and K-NN algorithms to detect unknown viruses. He also used a rough set to simplify the characteristic and avoid the loss of information. Relevant scholars from Germany placed the malicious code in the environment of the virtual machine software and analyzed the code by tracking program behavior. After repeated research of the scholars' work simultaneously at home and abroad, hackers, in order to increase the survivability of the malicious code, also adopted anti-debugging techniques to check whether the code is being debugged. Therefore, in the context of malicious behavior, we still need some security experts to study and analyze the resultant data, but the judgment process will consume much time [2].

On the basis of the results of predecessors' research, this paper has conducted further research on the malicious code detection technology. It mainly focuses on the analysis of the malicious code, discusses the description method of malicious behavior, and applies the behavior analysis technology in virus detection model. This paper provides guidance for future research in this field [3].

Section snippets

Dynamic heuristic scanning technique

Dynamic heuristic scanning technique is a behavior-based technique to monitor the running of a dynamic computer program and restrict the dynamic behavior of the computer. During the running of a program, some malicious and illegal procedures are often generated that are in conflict with the general procedures; these are intercepted and stemmed by the dynamic heuristic scanning technique.

Establishment of the model

Detection index is the basis for determining the merits of the model test results. In this paper, test results are determined mainly through false negatives and false positives. The false negatives view legal program as malicious code. The false positives view malicious code as normal legal procedures [6].

Let N be the number of procedures needed for the detection, m be the malicious codes, and n be the legitimate programs, then the condition N=m+n should be satisfied, provided all the three

Conclusions

This paper focuses on dynamic heuristic scanning technique and malicious code detection model. First, the dynamic heuristic scanning technique is analyzed and summarized, because this technique is widely used in the field of antivirus software and can detect the malicious code. This attributes to its wide application in the maintenance of network security. Second, the behavioral characteristics of malicious code and the minimum distance analyzer are used to establish a sample that distinguishes

Acknowledgements

This study was supported by the Fundamental Research Funds for the Central Universities (No. 3091601510).

References (11)

  • Ryuiti Koike et al.

    Development of system for the automatic generation of unknown virus extermination software

  • Hassan Salmani et al.

    A novel technique for improving hardware Trojan detection and reducing Trojan activation time

    IEEE Trans. Very Large Scale Integr. (VLSI) Syst.

    (2011)
  • Christopher Kruegel

    Increase dynamic coverage

    (Sep. 2007)
  • Francesco Di Cerbo et al.

    Detection of malicious applications on Android OS

    IEEE Comput. Soc.

    (2010)
  • Po-Ching Lin et al.

    A hybrid algorithm of Backward Hashing and automaton tracking for virus scanning

    IEEE Trans. Comput.

    (2011)
There are more references available in the full text version of this article.

Cited by (13)

View all citing articles on Scopus
View full text