A Hybrid Technique for Complete Viral Infected Recovery

作者: Pawut Satitsuksanoh , Peraphon Sophatsathit , Chidchanok Lursinsap

DOI: 10.1007/978-3-642-10392-6_14

关键词:

摘要: This research proposes a hybrid technique for computer virus detection and recovery. We made use of the well-established BWT to pinpoint where infection was located. To insure perfect detection, CRC supplemented. In mean time, original uninfected code analyzed obtain necessary unique identifications, whereby recovery process can be carried out directly with reference these identifications. The proposed gauged against couple commercial anti-virus software found perform its task perfection.

参考文章(22)
M. Nelson, Data compression with the Burrows-Wheeler Transform Dr. Dobb's Jourmal. ,(1996)
Éric Filiol, Computer Viruses: from Theory to Applications Springer. ,(2005)
J. O. Kephart, A biologically inspired immune system for computers Artificial Life. ,(1994)
David M. Chess, Gregory B. Sorkin, Gerald J. Tesauro, Jeffrey O. Kephart, William C. Arnold, Steve R. White, Biologically inspired defenses against computer viruses international joint conference on artificial intelligence. pp. 985- 996 ,(1995)
Hyungjoon Lee, Wonil Kim, Manpyo Hong, Artificial Immune System against Viral Attack international conference on computational science. pp. 499- 506 ,(2004) , 10.1007/978-3-540-24687-9_63
P. Koopman, 32-bit cyclic redundancy codes for Internet applications dependable systems and networks. pp. 459- 472 ,(2002) , 10.1109/DSN.2002.1028931
In Seon Yoo, Ulrich Ultes-Nitsche, Non-signature based virus detection Journal in Computer Virology. ,vol. 2, pp. 163- 186 ,(2006) , 10.1007/S11416-006-0013-1
Giovanni Di Crescenzo, Faramak Vakil, Cryptographic hashing for virus localization Proceedings of the 4th ACM workshop on Recurring malcode - WORM '06. pp. 41- 48 ,(2006) , 10.1145/1179542.1179550
Kenneth S. Edge, Gary B. Lamont, Richard A. Raines, A retrovirus inspired algorithm for virus detection & optimization Proceedings of the 8th annual conference on Genetic and evolutionary computation - GECCO '06. pp. 103- 110 ,(2006) , 10.1145/1143997.1144016