INFORMATION TECHNOLOGY OF DIAGNOSING COMPUTER SYSTEMS FOR THE POLYMORPHIC CODE
Keywords:
polymorphic virus, potentially dangerous behavior, modified emulatorsAbstract
The paper presents information technology of detection of polymorphic viruses based of the modified emulators on a corporate network, allows to realize detection of the new polymorphic viruses and copies which are already existing. For the purpose of increase in efficiency of diagnostics in a basis of an information technology the method of forming of behavior of polymorphic viruses and formation of the database potentially of dangerous behavior has been presented.
References
2. Vinod P. Scattered Feature Space for Malware Analysis / P. Vinod, V. Laxmi, M. S. Gaur // Communications in Computer and Information Science. — 2011. — Vol. 190. — P. 562—571.
3. Lee J. Detecting Metamorphic Malwares Using Code Graphs / J. Lee, K. Jeong, H. Lee // In proc. ACM Symposium on Applied Computing, NY. — 2010. — P. 1970—1977.
4. Kruegel C. Evasive Malware Exposed and Deconstructed / C. Kruegel // RSA Conference, November, 2015. — P. 12—20.
5. Pomorova O. Metamorphic Viruses Detection Technique based on the Modified Emulators / O. Pomorova, O. Savenko,
S. Lysenko, A. Nicheporuk // In Proc. ICT in Education, Research and Industrial Applications. Integration, Harmonization and Knowledge Transfer, Vol. 1614, Kyiv, June 2016. — P. 375—383.
6. Савенко О. С. Модель процесу діагностування комп’ютерних систем на наявність поліморфного та метаморфного програмного коду / О. С. Савенко, С. М. Лисенко, А. О. Нічепорук // Інформаційні технології та комп’ютерна інженерія. — 2014. — № 6. — С. 46—51.
Downloads
-
PDF (Українська)
Downloads: 57
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).