Netinfo Security ›› 2024, Vol. 24 ›› Issue (5): 657-666.doi: 10.3969/j.issn.1671-1122.2024.05.001
Previous Articles Next Articles
WEN Weiping(
), ZHANG Shichen, WANG Han, SHI Lin
Received:2023-08-15
Online:2024-05-10
Published:2024-06-24
Contact:
WEN Weiping
E-mail:weipingwen@pku.edu.cn
CLC Number:
WEN Weiping, ZHANG Shichen, WANG Han, SHI Lin. Linux Malicious Application Detection Scheme Based on Virtual Machine Introspection[J]. Netinfo Security, 2024, 24(5): 657-666.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2024.05.001
| ROOTKIT | 微步 | 阿里云 沙箱 | VMI Sandbox |
|---|---|---|---|
| Kopycat | 良性,无恶意行为 | 未检测到 | 良性,无恶意行为 |
| Subversive | 根据杀毒引擎判别为恶意,但无恶意行为 | 未检测到 | 良性,无恶意行为 |
| Sutekh | 良性,无恶意行为 | 未检测到 | 恶意,修改内核系统调用表 |
| Zero | 良性,无恶意行为 | 未检测到 | 良性,无恶意行为 |
| Fops | 良性,无恶意行为 | 未检测到 | 良性,无恶意行为 |
| Xor128 | 良性,无恶意行为 | 未检测到 | 良性,无恶意行为 |
| spy | 根据杀毒引擎判别为恶意,但无恶意行为 | 未检测到 | 良性,无恶意行为 |
| Diamorphine | 根据杀毒引擎判别为恶意,但无恶意行为 | 未检测到 | 恶意,修改内核系统调用表 |
| Puszek-Rootkit | 良性,无恶意行为 | 未检测到 | 恶意,修改内核系统调用表 |
| LilyOfTheValley | 根据杀毒引擎判别为恶意,但无恶意行为 | 未检测到 | 良性,无恶意行为 |
| Reptile | 良性,无恶意行为 | 未检测到 | 恶意,修改了内核inet_ioctl、load_elf_binary、vfs_read、next_tgid、vfs_statx、audit_alloc符号对应的区域 |
| module.c | 根据杀毒引擎判别为恶意,但无恶意行为 | 未检测到 | 恶意,修改了内核inet_ioctl、load_elf_binary、vfs_read、next_tgid、vfs_statx、audit_alloc符号对应的区域 |
| lkm2_sys_call_table | 良性,无恶意行为 | 未检测到 | 良性,无恶意行为 |
| lkm3_backdoor | 良性,无恶意行为 | 未检测到 | 良性,无恶意行为 |
| lkm4_hideFile | 良性,无恶意行为 | 未检测到 | 恶意,修改了内核ext4_dir_operations符号对应的区域 |
| lkm5_hide_process | 良性,无恶意行为 | 未检测到 | 良性,无恶意行为 |
| lkm6_hideMod | 良性,无恶意行为 | 未检测到 | 恶意,修改了内核modules_op、kernfs_dir_fops符号对应的区域 |
| [1] | CNCERT/CC. 2020 China Internet Network Security Report[EB/OL]. (2021-07-21)[2023-08-01]. http://www.cac.gov.cn/2021-07/21/c_1628454189500041.htm. |
| 国家计算机网络应急技术处理协调中心. 2020年中国互联网网络安全报告[EB/OL]. (2021-07-21)[2023-08-01]. http://www.cac.gov.cn/2021-07/21/c_1628454189500041.htm. | |
| [2] | CNCERT/CC. Overview of China’s Internet Network Security Situation in 2020[EB/OL]. (2021-05-26)[2023-08-01]. http://www.cac.gov.cn/2021-05/26/c_1623610314656045.htm. |
| 国家计算机网络应急技术处理协调中心. 2020年我国互联网网络安全态势综述[EB/OL]. (2021-05-26)[2023-08-01]. http://www.cac.gov.cn/2021-05/26/c_1623610314656045.htm. | |
| [3] | FANG Zhan, LIU Jun, HUANG Ribian, et al. Research on Multi-Model Android Malicious Application Detection Based on Feature Fusion[C]// IEEE. 2021 4th International Conference on Robotics, Control and Automation Engineering (RCAE). New York: IEEE, 2021: 318-325. |
| [4] | QIU Hongyuan, FERNANDO C. COLON O. Static Malware Detection with Segmented Sandboxing[EB/OL]. (2013-10-22)[2023-08-01]. https://ieeexplore.ieee.org/document/6703695. |
| [5] | ALKHATEEB E M S. Dynamic Malware Detection Using API Similarity[EB/OL]. (2017-09-14)[2023-08-01]. https://ieeexplore.ieee.org/document/8031489. |
| [6] | KEDZIORA M, GAWIN P, SZCZEPANIK M, et al. Malware Detection Using Machine Learning Algorithms and Reverse Engineering of Android Java Code[EB/OL]. (2019-01-29)[2023-08-01]. https://www.researchgate.net/publication/331245836_Malware_Detection_Using_Machine_Learning_Algorithms_and_Reverse_Engineering_of_Android_Java_Code. |
| [7] | BAUMAN E, AYOADE G, LIN Zhiqiang. A Survey on Hypervisor-Based Monitoring: Approaches, Applications, and Evolutions[J]. ACM Computing Surveys (CSUR), 2015, 48(1): 1-33. |
| [8] | LI Baohui, XU Kefu, ZHANG Peng, et al. Research and Application Progress of Virtual Machine Introspection Technology[J]. Journal of Software, 2016, 27(6): 1384-1401. |
| [9] | ROSENBLUM M, GARFINKEL T. Virtual Machine Monitors: Current Technology and Future Trends[J]. Computer, 2005, 38(5): 39-47. |
| [10] |
HOCHREITER S, SCHMIDHUBER J. Long Short-Term Memory[J]. Neural Computation, 1997, 9(8): 1735-1780.
doi: 10.1162/neco.1997.9.8.1735 pmid: 9377276 |
| [11] | TAN Liuyan, RUAN Shuhua, YANG Min, et al. Educational Data Classification Based on Deep Learning[J]. Netinfo Security, 2023, 23(3): 96-102. |
| [12] | DEY R, SALEM F M. Gate-Variants of Gated Recurrent Unit (GRU) Neural Networks[EB/OL]. (2017-10-02)[2023-08-01]. https://ieeexplore.ieee.org/document/8053243. |
| [13] | KUMAR R, CHARU S. An Importance of Using Virtualization Technology in Cloud Computing[J]. Global Journal of Computers & Technology, 2015, 1(2): 2623-2634. |
| [14] | ZHANG Jixin, ZHANG Kehuan, QIN Zheng, et al. Sensitive System Calls Based Packed Malware Variants Detection Using Principal Component Initialized Multilayers Neural Networks[J]. Cybersecurity, 2018(10): 21-34. |
| [15] | RABADI D, TEO S G. Advanced Windows Methods on Malware Detection and Classification[C]// ACM. The 36th Annual Computer Security Applications Conference (ACSAC’20). New York: ACM, 2020: 54-68. |
| [1] | HUANG Zilong, ZHAN Dongyang, YE Lin, ZHANG Hongli. A Secure Container Management Approach Based on Virtual Machine Introspection [J]. Netinfo Security, 2022, 22(11): 55-61. |
| [2] | REN Shixuan, WANG Maoyu, ZHAO Hui. An Improved Method of Backdoor Attack in DNN [J]. Netinfo Security, 2021, 21(5): 82-89. |
| [3] | LIU Heng, WU Dexin, XU Jian. Generating Universal Adversarial Perturbations with Generative Adversarial Networks [J]. Netinfo Security, 2020, 20(5): 57-64. |
| [4] | Jinghao LIU, Siping MAO, Xiaomei FU. Intrusion Detection Model Based on ICA Algorithm and Deep Neural Network [J]. Netinfo Security, 2019, 19(3): 1-10. |
| [5] | Jian ZHANG, Wenzhen LI, Liangyi GONG. Research on Malicious E-mail Detection Technology [J]. Netinfo Security, 2018, 18(9): 80-85. |
| [6] | Jian ZHANG, Cheng GAO, Liangyi GONG, Zhaojun GU. Research on Virtual Machine Introspection Technology [J]. Netinfo Security, 2017, 17(9): 63-68. |
| [7] | Khan Safi Qamas GUL, Jize YIN, Limin PAN, Senlin LUO. Research on the Algorithm of Named Entity Recognition Based on Deep Neural Network [J]. Netinfo Security, 2017, 17(10): 29-35. |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||