共查询到20条相似文献,搜索用时 93 毫秒
1.
2.
朱俚治 《计算机技术与发展》2014,(10):163-166
病毒技术历经半个世纪的发展,如今已不是单纯的病毒技术,而是融合了其他黑客等技术,因此当今病毒的危害性和传播速度远远超过了病毒原始形态。病毒的传染性以及病毒的变种技术在病毒上的应用使得病毒呈现一定的智能性。因此,为了应对病毒的变种技术以及病毒其他方面所呈现出的智能性,文中参考已有的检测病毒方法之后,提出了一种具有智能性的检测病毒的方法。文中使用沙箱作为检测病毒的运行环境,并使用BP神经网络作为检测病毒的工具,然后给出了一种具有一定智能性的病毒检测方法。该方法能够对被怀疑的非法变化的程序中是否存在病毒做出判断。 相似文献
3.
5.
6.
7.
示踪病毒在细胞内的感染路径对探究病毒的感染机制具有重要意义,病毒标记是实现病毒示踪的关键。针对目前病毒标记方法中存在的不足,该文提出了一种基于代谢工程的病毒原位生物正交标记技术。脂质/氨基酸/单糖的叠氮衍生物经细胞代谢将叠氮基团修饰在病毒表面,被修饰病毒粒子识别结合宿主细胞后与携带二苯基环辛炔(DBCO)的荧光探针经生物正交反应连接从而实现病毒标记。结果显示,叠氮基团在囊膜病毒和非囊膜病毒表面都有很好的修饰效果,并且在原位生物正交中携带二苯基环辛炔基团的荧光探针可快速捕捉到叠氮修饰的病毒粒子实现病毒标记。该标记方法不仅操作简单,而且适用于囊膜病毒与非囊膜病毒的标记。 相似文献
8.
病毒的出现已有四十年左右,在这四十几年中,病毒经过了数代发展和技术更新,如今的病毒已发展为第四代病毒。但不论病毒技术如何发展,如果某个程序是病毒,那么这个程序就具有病毒应有的属性,病毒的传染模块是区别于其他恶意程序的重要属性。因此,将从未知程序属性的角度,提取其属性并将其属性与病毒传染模块属性进行比较。如果未知程序某些属性值接近病毒传染模块的属性值,那么就在此基础上再使用病毒感染实验法.进一步判定该未知程序是不是病毒。 相似文献
9.
10.
11.
12.
Li-Chiou Chen Carley K.M. 《IEEE transactions on systems, man, and cybernetics. Part B, Cybernetics》2004,34(2):823-833
Countermeasures such as software patches or warnings can be effective in helping organizations avert virus infection problems. However, current strategies for disseminating such countermeasures have limited their effectiveness. We propose a new approach, called the Countermeasure Competing (CMC) strategy, and use computer simulation to formally compare its relative effectiveness with three antivirus strategies currently under consideration. CMC is based on the idea that computer viruses and countermeasures spread through two separate but interlinked complex networks-the virus-spreading network and the countermeasure-propagation network, in which a countermeasure acts as a competing species against the computer virus. Our results show that CMC is more effective than other strategies based on the empirical virus data. The proposed CMC reduces the size of virus infection significantly when the countermeasure-propagation network has properties that favor countermeasures over viruses, or when the countermeasure-propagation rate is higher than the virus-spreading rate. In addition, our work reveals that CMC can be flexibly adapted to different uncertainties in the real world, enabling it to be tuned to a greater variety of situations than other strategies. 相似文献
13.
传染是计算机病毒的主要特征之一,病毒的传染不仅提高了病毒的存活率,而且对计算机系统资源造成破坏和威胁。为了分析计算机病毒在计算机内的微观传染规律,在分析病毒传染机制的基础上,结合当前操作系统的特点,建立和分析了计算机病毒在单个计算机系统内的随机传染模型。得出结论:在单进程操作系统环境下,病毒的感染数量呈线性增长,感染强度相对稳定;在多进程操作系统环境下,病毒的感染数量和感染强度都呈e的指数级增长。最后提出了反病毒传染技术的发展趋势。 相似文献
14.
孙伟 《数字社区&智能家居》2008,(3):1221-1223
本文从病毒的定义、计算机病毒自身特征、病毒分类、病毒发展的特点、计算机病毒的基本机制、计算机病毒的检测方法几个方面来说明计算机系统是脆弱的,计算机病毒的危害是巨大的。因此,为了确保信息的安全与畅通,一定要作好对病毒的检测防范工作。 相似文献
15.
尹燮 《计算机光盘软件与应用》2011,(15)
计算机病毒是一种人为制造的,对计算机信息系统进行破坏的程序。随着网络的迅速普及,计算机病毒的危害越来越严重。本文将介绍如何发现计算机病毒及常见的计算机病毒的预防措施。 相似文献
16.
《Computers & Security》2002,21(2):142-163
Computer viruses present an increasing risk to the integrity of information systems and the functions of a modern business enterprise. Systematic study of this problem can yield better indicators of the impact of computer viruses as well as a better understanding of strategies to reduce that impact.We conducted a Computer Virus Epidemiology Survey (CVES) on the World Wide Web to examine indicators of the impact of computer viruses. A major finding from the CVES is that multiple indicators of the impact of computer viruses reveal a problem growing more severe that affects large, as well as small, organizations. Another important finding is that viruses not detected despite regular updating of antiviral software caused only about 15% to 21% of virus problems reported in workgroups using antiviral software. The possible reasons for failure to detect include improper configuration of software and the inability of all known anti-virus detectors to detect. A related implication is that a substantial amount of damage due to viruses could probably have been prevented by regular updating of antiviral software.We also used the CVES in the development of a simulation model for the spread of computer viruses in workgroups in order to analyze the effect of a notification process on control. Our major finding is that the process of notification, whether by human behaviour or by technology, substantially reduces the impact of computer viruses in workgroups. For example, if a workgroup has a period of vulnerability when only 80% of its workstations are effectively using antiviral software, then even a 50% probability of notification of a detected virus substantially reduces the burden. An added benefit of maintaining an environment with high effective antiviral software usage and high levels of notification is that greater rates of communication events that can potentially transmit computer viruses within the workgroup actually reduce the impact of computer viruses in the workgroup. Anecdotal observations also indicate that the process of notification is significant in controlling the spread of ‘new’ viruses not yet detectable by software, although the process of notification from law enforcement authorities to workgroups was not in the simulation model.More formally, the reduced impact of computer viruses in a workgroup due to a greater rate of communication events that can potentially transmit computer viruses corresponds to a situation when a computer virus introduced into the workgroup produces, on average, less than one copy in the workgroup. This threshold corresponds to the basic reproduction ratio in epidemiology that describes the spread of infectious disease. 相似文献
17.
SUN Wei 《数字社区&智能家居》2008,(7)
本文从病毒的定义、计算机病毒自身特征、病毒分类、病毒发展的特点、计算机病毒的基本机制、计算机病毒的检测方法几个方面来说明计算机系统是脆弱的,计算机病毒的危害是巨大的。因此,为了确保信息的安全与畅通,一定要作好对病毒的检测防范工作。 相似文献
18.
计算机病毒的检测与清除是一项复杂任务,对每一个新病毒,需要增添新的特征码,编写清除子程序。提出一种用于描述计算机病毒的计算机语言VDL,它以统一的方式描述计算机病毒,目的在于自动生成计算机病毒的检测与清除子程序。用BNF范式给出VDL的语法,用自然语言解释它的语义,并给出了一个例子。 相似文献
19.
以“毒”攻毒不是异想天开 总被引:5,自引:0,他引:5
随着因特网技术的广泛应用和发展,计算机病毒的传播形式发生了根本的变化,用户机器感染计算机病毒的几率大大增加。而计算机病毒与黑客技术的融合,使其具有了前所未有的破坏性。该文根据计算机病毒传播的特点,描述了以“毒”攻毒的工作和传播方式,从技术和实际需求讨论了以“毒”攻毒的可行性和必要性。同时对它可能产生的问题进行分析,并且提出了疫苗共享的思想。 相似文献