首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Letting computer viruses loose on a quarantined computer and recording their pattern of activity could lead to a better way of s
Letting computer viruses loose on a quarantined computer and recording their pattern of activity could lead to a better way of s
admin
2009-06-24
24
问题
Letting computer viruses loose on a quarantined computer and recording their pattern of activity could lead to a better way of spotting them in the "wild".
A prototype system developed at the University of Michigan uses the "fingerprint" of virus activity to identify them more effectively than existing anti-virus software.
The designers of programs that damage, take over or steal data from computers—called malware—are locked in an arms race with companies that make anti-virus (AV) software to prevent and fix malware damage.
Conventional AV software looks for suspicious behavior and then tries to determine what’s causing it. It does this by looking for virus "signatures"—chunks of computer code from known viruses.
But identifying previously unknown malware is difficult, and keeping track of different variants of existing viruses makes it harder. For example, a virus called Agobot has split into more than 580 variants since its release in 2002.
In tests, Michael Bailey and colleagues at the University of Michigan, U.S., showed that five leading AV programs could identify only between 50 and 80 percent of a large sample of malware. And the programs struggled to agree on what they had found—the identifications often did not match.
Bailey and his team say their approach is superior and have used it to develop a prototype AV system that is significantly better at identifying viruses once they are detected.
The team set loose the malicious software on a quarantined computer, recording all the files and strings of instructions (processes) created and modified by the malware.
They then created software that uses a database of these "fingerprints" to identify malware. It can also define clusters of malware that operate in similar ways, and generate a kind of family tree showing how superficially different programs have similar modi operandi.
In tests on the same malware, the new software could identify at least 10 percent more of the sample than any of the other AV software. It also always correctly linked different pieces of malware that behave in the same way—the best AV program spotted only 68 percent of such doubles.
"What they’re doing here is quite viable", says Richard Overill, a researcher at Kings College London, UK. "In principle this should work very well at identifying different viruses, and grouping those that may appear different but work in the same way".
The new approach could reduce the number of updates needed for conventional AV systems, suggests Overill. "Instead of having separate patches for each virus, this could be more efficient and reduce the size of updates that must be downloaded".
Grant Malcom researches computer security at Liverpool University, U.K. He says that recording activities like files created and modified is a novel approach to the problem and that it would be interesting to see whether this approach to categorizing malware could work without giving false positives.
选项
A、There is competition between virus designers and AV companies.
B、The definition of "malware".
C、Malware designers are locked up by AV companies.
D、A metaphoric explanation of how the new AV software is developed.
答案
D
解析
转载请注明原文地址:https://kaotiyun.com/show/hbTd777K
本试题收录于:
公共英语五级笔试题库公共英语(PETS)分类
0
公共英语五级笔试
公共英语(PETS)
相关试题推荐
ChangesinMuseumsMuseumshavechanged.Theyarenolongerplacesthatone"should"visit,theyareplacestoenjoyand
Duringthegame,themoraleoftheathletesisextremelyimportant.
WhyWouldTheyFalselyConfess?Whyonearthwouldaninnocentpersonfalselyconfesstocommittingacrime?Tomostpeople
Peterisexperiencingadifficultperiodinhislife.
EatingMeat—LessorMore?EverysecondintheUnitedStatesalone,morethan250animalsareslaughteredforfood,adding
Whichofthefollowingistrueaccordingtotheauthor?Whendoeseducationbegin?
PoliticalSpinsLastweek,USWhiteHousespokesmanTonySnowsentjournalistsdiggingfortheirdictionaries.Hecalledrec
WaystoReduceExposuretoAirPollution1Areportpublishedrecentlybringsbadnewsaboutairpollution.Itsuggeststhatit
RuthBenedict’shighlypopularbookPatternsofCulturestressedtheroleofcultureinpersonalityformation.
Howdidthestudyevaluateeveryparticipant’ssenseofresponsibility?Previousstudiessuggest______.
随机试题
什么叫指状加热器?怎样操作?
阅读《郑伯克段于鄢》中的一段文字,回答下列问题:既而大叔命西鄙北鄙贰于己。公子吕曰:“国不堪贰,君将若之何?欲与大叔,臣请事之,若弗与,则请除之,无生民心。”公白:“无庸,将自及。”大叔又收贰以为己邑,至于廪延。子封曰:“可矣,厚将得众。”公曰:
女性,50岁,自称“黏液脓血便”1个月,每天3—4次,伴下腹部深在疼痛、里急后重感及乏力。根据大便化验曾按“痢疾”治疗2周,疗效不明显。应首选的进一步检查是
作痰液细菌学检查时,收集标本时应注意()。
患者,女,49岁。月经或前或后,烘热出汗,五心烦热,头晕耳鸣,腰酸乏力,舌红苔薄,脉细数。治疗应首选()
《城市房屋拆迁管理条例》规定,申请领取房屋拆迁许可证的,应当向房屋所在地的市、县人民政府房屋拆迁管理部门提交资料,其中不包括()。
建设项目后评价的主要内容包括( )。
为满足要求工期,在对工程网络计划进行工期优化时应( )。
2001年,甲(男)20岁,乙(女)19岁时举办结婚仪式,但一直未办结婚登记,后于2005年双方补办结婚登记。2005年,甲继承其叔父在台湾的遗产10万元。2007年3月,双方因感情破裂,准备离婚。下列说法正确的是()。
以下叙述中错误的是
最新回复
(
0
)