Registry table anomaly behaviors detecting technology for recognizing malicious scripts

  • Xinlong Bao*
  • , Wenjian Luo
  • , Xianbin Cao
  • , Xufa Wang
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

Based on real-time catching registry table behaviors of applications, a novel registry table anomaly behaviors detecting technology is proposed. The kernel ideas and detailed implementation methods are described by taking Internet Explore browser for example, and the practical experiments are done. The experimental results prove that this technology is feasible and effective.

Original languageEnglish
Pages (from-to)137-139
Number of pages3
JournalJisuanji Gongcheng/Computer Engineering
Volume31
Issue number8
StatePublished - 20 Apr 2005
Externally publishedYes

Keywords

  • Anomaly behaviors detecting
  • Malicious script
  • Registry table
  • Self set

Fingerprint

Dive into the research topics of 'Registry table anomaly behaviors detecting technology for recognizing malicious scripts'. Together they form a unique fingerprint.

Cite this