首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Letting computer viruses loose on a quarantined computer and recording their pattern of activity could lead to a better way of s
Letting computer viruses loose on a quarantined computer and recording their pattern of activity could lead to a better way of s
admin
2009-06-24
36
问题
Letting computer viruses loose on a quarantined computer and recording their pattern of activity could lead to a better way of spotting them in the "wild".
A prototype system developed at the University of Michigan uses the "fingerprint" of virus activity to identify them more effectively than existing anti-virus software.
The designers of programs that damage, take over or steal data from computers—called malware—are locked in an arms race with companies that make anti-virus (AV) software to prevent and fix malware damage.
Conventional AV software looks for suspicious behavior and then tries to determine what’s causing it. It does this by looking for virus "signatures"—chunks of computer code from known viruses.
But identifying previously unknown malware is difficult, and keeping track of different variants of existing viruses makes it harder. For example, a virus called Agobot has split into more than 580 variants since its release in 2002.
In tests, Michael Bailey and colleagues at the University of Michigan, U.S., showed that five leading AV programs could identify only between 50 and 80 percent of a large sample of malware. And the programs struggled to agree on what they had found—the identifications often did not match.
Bailey and his team say their approach is superior and have used it to develop a prototype AV system that is significantly better at identifying viruses once they are detected.
The team set loose the malicious software on a quarantined computer, recording all the files and strings of instructions (processes) created and modified by the malware.
They then created software that uses a database of these "fingerprints" to identify malware. It can also define clusters of malware that operate in similar ways, and generate a kind of family tree showing how superficially different programs have similar modi operandi.
In tests on the same malware, the new software could identify at least 10 percent more of the sample than any of the other AV software. It also always correctly linked different pieces of malware that behave in the same way—the best AV program spotted only 68 percent of such doubles.
"What they’re doing here is quite viable", says Richard Overill, a researcher at Kings College London, UK. "In principle this should work very well at identifying different viruses, and grouping those that may appear different but work in the same way".
The new approach could reduce the number of updates needed for conventional AV systems, suggests Overill. "Instead of having separate patches for each virus, this could be more efficient and reduce the size of updates that must be downloaded".
Grant Malcom researches computer security at Liverpool University, U.K. He says that recording activities like files created and modified is a novel approach to the problem and that it would be interesting to see whether this approach to categorizing malware could work without giving false positives.
选项
A、There is competition between virus designers and AV companies.
B、The definition of "malware".
C、Malware designers are locked up by AV companies.
D、A metaphoric explanation of how the new AV software is developed.
答案
D
解析
转载请注明原文地址:https://kaotiyun.com/show/hbTd777K
本试题收录于:
公共英语五级笔试题库公共英语(PETS)分类
0
公共英语五级笔试
公共英语(PETS)
相关试题推荐
Psychologiststhinkofattitudesasbeingpredispositionstowardobjectsoreventsthatdeterminethewaypeoplereacttodiffer
GenerationGapAfewyearsago,itwasfashionabletospeakofagenerationgap,adivisionbetweenyoungpeopleandtheir
EatingMeat—LessorMore?EverysecondintheUnitedStatesalone,morethan250animalsareslaughteredforfood,adding
WorkandHappinessWhetherworkshouldbeplacedamongthecausesofhappinessoramongthecausesofunhappinessmayperha
WhichofthefollowingstatementsabouttheEuropeansoldiersiscorrect?Afterreadingthepassage,youmayconcludethat_____
Whereisthenapkinnormallyplacedduringthemeal?Allofthefollowingarefingerfoodsexcept
TheAmericanFamilyIntheAmericanfamilythehusbandandwifeusuallyshareimportantdecisionmaking.Whenthechildrenareo
APopularityofScienceFictionBAFairlyNewDevelopmentCClassicsofScienceFictionDDifficultyinKeepingaheadofSc
ALetterfromAlanIhavelearntofaplantobuildthreehundredhousesonthelandcalledParson’sPlacebythefootballg
Whatisyourresponsibilitywhenyou,asaschoolprincipal,gettheteacher’sreport?
随机试题
患者,男,40岁。患十二指肠溃疡,择期经上腹正中切口行胃大部切除术,并置切口内乳胶片引流。一般拔除引流片的时间是
A、过敏性紫癜肾炎B、IgA肾病C、急性链球菌感染后肾小球肾炎D、原发性小血管炎肾损害E、狼疮性肾炎患者,女性,23岁,发热、乏力、浮肿、尿少1个月,既往有光过敏史、时有关节肿痛,辅助检查显示中等量蛋白尿,镜下血尿,双侧胸
A、为治脾经湿热之口甜或口苦、多涎之要药B、为治湿阻寒凝之气滞胎动不安的是C、善治湿浊中阻证及阴寒闭暑证等,尤宜寒湿中阻之呕吐或兼表者D、为湿浊内停无论寒热虚实或有无表邪皆可用E、为治湿阻,食积,气滞所致的脘腹胀满
某地1998~2003年某家用电器销售量和人均年收入如表8-4所示,预计到2005年人均年收入较2003年增加36%,年人口增长控制在0.5%以内。 A、B两公司是该家用电器在国内市场的主要竞争对手,A公司为了制定主要针对B公司的竞争战略,运用竞争态
价值工程对象选择中,凭借开展价值工程活动人员的经验和智慧,根据对象选择应考虑的因素,通过定性分析选择对象的方法,称为()。
()是指银行通过合法筹集资金而自主发放的贷款。它的特点在于,银行负责收回本息,风险全部由银行自己承担。
根据《中华人民共和国全民所有制工业企业法》的规定,下列选项中,厂长可行使的职权有()。
下列海洋中哪一个是我国最大的海?()
新民主主义革命时期,党内犯“左”倾错误的人提出“毕其功于一役”的主张,搞所谓的“无间断”革命,这种错误倾向实质上是
DEVELOPMENTSINTHECONSTRUCTIONOFTALLBUILDINGS1Untilthenineteenthcentury,mosttallbuildingswereconstructedofloa
最新回复
(
0
)