A Technical Practice of Opposing Virus with Software Self-defense
碩士 === 中國文化大學 === 資訊管理研究所 === 93 === With the fast developing of internet, computer viruses are easier to use all kinds of medium to spread, such as E-mail, MSN. Therefore, today the anti-virus software al-ready becomes the necessary equipment of computer. But the Scanner presently used by the anti-...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2005
|
Online Access: | http://ndltd.ncl.edu.tw/handle/65866740577973017684 |
id |
ndltd-TW-093PCCU0396032 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-093PCCU03960322015-10-13T15:29:21Z http://ndltd.ncl.edu.tw/handle/65866740577973017684 A Technical Practice of Opposing Virus with Software Self-defense 軟體對抗病毒自我防衛技術實作之研究 Chih-Chung Lin 林志宗 碩士 中國文化大學 資訊管理研究所 93 With the fast developing of internet, computer viruses are easier to use all kinds of medium to spread, such as E-mail, MSN. Therefore, today the anti-virus software al-ready becomes the necessary equipment of computer. But the Scanner presently used by the anti-virus software still can’t immediately discover the new viruses which just start to spread without the new virus definition files. While the anti-virus software still waits for new virus definition files, the new viruses may already stealthily propagate them-selves quickly via the network, infect tens of thousands of computers, and make many damages – the Blaster virus in 2003, the Sasser virus in 2004 for example. Deng, Shieh, Wang, Tung, and Yen (2003) proposed a software self-defense scheme. The scheme uses two files and let them check each other. They not only can detect virus infection but also avoid being destroyed. The above-mentioned authors also suggested using the concept of mutation virus in the self-defense scheme to reduce the opportunities of being destroyed by viruses. However, in their paper, they did not illustrate how to practice, and ignored the integration and information hiding problems between the two files. This research refines the above-mentioned two-file scheme to integrate the muta-tion technique of virus, hide the relationship between the two files, and actually design and practice the software self-defense model which can do self-mutate. Wen-Gong Shieh 謝文恭 2005 學位論文 ; thesis 61 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 中國文化大學 === 資訊管理研究所 === 93 === With the fast developing of internet, computer viruses are easier to use all kinds of medium to spread, such as E-mail, MSN. Therefore, today the anti-virus software al-ready becomes the necessary equipment of computer. But the Scanner presently used by the anti-virus software still can’t immediately discover the new viruses which just start to spread without the new virus definition files. While the anti-virus software still waits for new virus definition files, the new viruses may already stealthily propagate them-selves quickly via the network, infect tens of thousands of computers, and make many damages – the Blaster virus in 2003, the Sasser virus in 2004 for example.
Deng, Shieh, Wang, Tung, and Yen (2003) proposed a software self-defense scheme. The scheme uses two files and let them check each other. They not only can detect virus infection but also avoid being destroyed. The above-mentioned authors also suggested using the concept of mutation virus in the self-defense scheme to reduce the opportunities of being destroyed by viruses. However, in their paper, they did not illustrate how to practice, and ignored the integration and information hiding problems between the two files.
This research refines the above-mentioned two-file scheme to integrate the muta-tion technique of virus, hide the relationship between the two files, and actually design and practice the software self-defense model which can do self-mutate.
|
author2 |
Wen-Gong Shieh |
author_facet |
Wen-Gong Shieh Chih-Chung Lin 林志宗 |
author |
Chih-Chung Lin 林志宗 |
spellingShingle |
Chih-Chung Lin 林志宗 A Technical Practice of Opposing Virus with Software Self-defense |
author_sort |
Chih-Chung Lin |
title |
A Technical Practice of Opposing Virus with Software Self-defense |
title_short |
A Technical Practice of Opposing Virus with Software Self-defense |
title_full |
A Technical Practice of Opposing Virus with Software Self-defense |
title_fullStr |
A Technical Practice of Opposing Virus with Software Self-defense |
title_full_unstemmed |
A Technical Practice of Opposing Virus with Software Self-defense |
title_sort |
technical practice of opposing virus with software self-defense |
publishDate |
2005 |
url |
http://ndltd.ncl.edu.tw/handle/65866740577973017684 |
work_keys_str_mv |
AT chihchunglin atechnicalpracticeofopposingviruswithsoftwareselfdefense AT línzhìzōng atechnicalpracticeofopposingviruswithsoftwareselfdefense AT chihchunglin ruǎntǐduìkàngbìngdúzìwǒfángwèijìshùshízuòzhīyánjiū AT línzhìzōng ruǎntǐduìkàngbìngdúzìwǒfángwèijìshùshízuòzhīyánjiū AT chihchunglin technicalpracticeofopposingviruswithsoftwareselfdefense AT línzhìzōng technicalpracticeofopposingviruswithsoftwareselfdefense |
_version_ |
1717766351066497024 |