Abstract
Malicious behavior detection using emulator or virtual machine is becoming an interesting issue in information security field because it is easy to re-initialize the system and execute codes in independent separate spaces which do not give any bad influence to the system. This paper proposes fast malicious codes detection system by using database of previous malicious codes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bacel, R., Mell, P.: Intrusion Detection Systems. NIST (2003)
Endorf, C., Schultz, E., Mellander, J.: Intrusion Detection & Prevention. McGraw-Hill, New York (2004)
Debar, H., Dacie, M., Wepsi, A.: A Revised Taxonomy for Intrusion- Detection Systems. IBM Report (1999)
Weaver, N., Paxson, V., Cunningham, R.: Taxonomy of Computer Worms. In: ACM CCS Workshop on Rapid Malcode (2003)
http://pc.ahnlab.com/bluebelt_pcdic/pcdic_view.do?BBS_SEQ=94759
National Cyber Security Center, Cyber Security, Personal authentication service (2010)
Seo, J.T.: Malicious Code Detection Technique in Virtual Environment (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Cheon, Hw., Lee, kW., Lee, SH., Lee, G. (2011). Malicious Software Detection System in a Virtual Machine Using Database. In: Lee, G., Howard, D., Ślęzak, D. (eds) Convergence and Hybrid Information Technology. ICHIT 2011. Communications in Computer and Information Science, vol 206. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24106-2_28
Download citation
DOI: https://doi.org/10.1007/978-3-642-24106-2_28
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-24105-5
Online ISBN: 978-3-642-24106-2
eBook Packages: Computer ScienceComputer Science (R0)