Windows关键技术研究及其在内网安全中的应用
[Abstract]:With the rapid development of computer technology and communication technology, the network is gradually changing the way of work and life of people, and has become a theme of social development. With the expansion of the scope of use of the network, the purpose of malicious code attack has also changed from showing off its destructive ability to the purpose of obtaining economic benefits and political destruction. In particular, when malicious programs intranet terminal mass infection, its destructive power and durability will multiply. The security of intranet terminal is mainly aimed at the filtering and processing of system message. The security technology of intranet terminal is mainly divided into user mode message filtering technology and kernel mode message filtering technology. In this paper, the Windows hook technology in user mode and file filter driver and disk filter driver in kernel mode are studied respectively, which solves the biggest problem of the security of intranet terminal, that is, the prevention and control of malicious program. The system solidification and malicious program detection in the intranet terminal security are realized. The main research contents are as follows: 1. This paper studies and analyzes two aspects of intranet security management system, including the protection of malicious programs and the detection of malicious programs. According to these two aspects, the requirements of the inner network with high security requirements are analyzed. 2. 2. In this paper, the Windows driver development technology and disk filter driver technology are studied. Among them, three key problems are emphatically studied: the problem of getting the disk physical file sector address in the disk filter drive. The problem of obtaining the cluster list of the physical files in the system and the problem of establishing the corresponding relationship between the cluster address and the sector address of the file are discussed. On the basis of this research, the operating system solidification scheme based on the disk filter driver is realized. Realized disk and memory registry one-way data transfer, thus avoiding registry key link damage caused by registry redirection. 3. 3. This paper studies the communication mechanism of Windows kernel device and the file system filter driver technology, which solves the problem of how to obtain the exact file name when the file system filter driver is creating the file. The dispatch function of the file system filter driver is not in the same thread as the completion function, which results in the buffer failure and the problem that the file system filter driver cannot capture the rename message when the file is renamed across the volume. On the basis of this research, the operating system curing scheme based on file system filter driver. 4. 4. A detection scheme for malicious programs with low miss detection rate is proposed. This scheme uses Windows hook technology to extract the running sequence of the program, and carries on the abstract processing, takes this as the program characteristic, reduces the content of redundant information in the feature, and innovatively introduces the k-gram algorithm which is originally used to calculate the similarity degree. Compared with other detection schemes using SVM classification algorithm, the calculation results of this algorithm are input as SVM classification algorithm, which not only reduces the vector dimension input, but also improves the computational efficiency of the detection scheme. Moreover, the lowest rate of missing detection was 1.91%.
【学位授予单位】:北京邮电大学
【学位级别】:硕士
【学位授予年份】:2016
【分类号】:TP316.7;TP393.08
【参考文献】
相关期刊论文 前10条
1 于航;刘丽敏;高能;李红达;;基于模拟器的沙箱系统研究[J];信息网络安全;2015年09期
2 陈珂;柯文德;王爱国;郑捷;张良均;;基于沙盒技术的行为分析系统研究[J];计算机技术与发展;2015年08期
3 刘敬;谷利泽;钮心忻;杨义先;李忠献;;基于神经网络和遗传算法的网络安全事件分析方法[J];北京邮电大学学报;2015年02期
4 任伟;柳坤;周金;;AnDa:恶意代码动态分析系统[J];信息网络安全;2014年08期
5 朱平;杜彦辉;;基于虚拟机与API调用监控技术的APT木马取证研究[J];信息网络安全;2014年04期
6 黄丽冰;;浅析内网安全管理[J];信息安全与技术;2014年01期
7 张小川;陈最;涂飞;;基于过滤驱动的透明加密文件系统研究与实现[J];计算机应用与软件;2013年04期
8 苗启广;王蕴;曹莹;刘文闯;;面向最小行为的恶意程序检测研究[J];系统工程与电子技术;2012年08期
9 李诗松;陈伟;陈运;;Windows平台下软件自身防护关键技术[J];计算机系统应用;2012年04期
10 陈林;刘粉林;芦斌;谢鑫;;基于k-gram频数的静态软件胎记[J];计算机工程;2011年04期
相关会议论文 前1条
1 陈云超;马兆丰;;基于API函数拦截技术的跨进程攻击防护研究[A];2011年通信与信息技术新进展——第八届中国通信学会学术年会论文集[C];2011年
相关博士学位论文 前1条
1 张一弛;程序恶意行为识别及其恶意性判定研究[D];解放军信息工程大学;2012年
相关硕士学位论文 前10条
1 谢锦彪;内网安全态势感知技术的研究与实现[D];广东工业大学;2015年
2 韩奕;基于行为分析的恶意代码检测与评估研究[D];北京交通大学;2014年
3 张文雯;基于状态图和语义分析的软件行为建模与检测研究[D];北京工业大学;2013年
4 张立建;Windows内核关键技术研究及其在内网安全中的应用[D];北京邮电大学;2013年
5 吴俣;基于沙盒技术的Windows文件系统虚拟化实现[D];华中科技大学;2013年
6 郑春阳;恶意程序检测与分类系统的设计与实现[D];西安电子科技大学;2013年
7 郑兴艳;安全虚拟桌面系统的设计与实现[D];北京交通大学;2012年
8 肖哲;军工企业内网主机信息安全管理系统设计与实现[D];西安电子科技大学;2012年
9 姜辉;基于虚拟化技术的恶意代码行为分析系统的研究与实现[D];济南大学;2012年
10 雷迟骏;基于启发式算法的恶意代码检测系统研究与实现[D];南京邮电大学;2012年
,本文编号:2181528
本文链接:https://www.wllwen.com/kejilunwen/ruanjiangongchenglunwen/2181528.html