詳細検索結果
以下の条件での結果を表示する: 検索条件を変更
クエリ検索: "Clam AntiVirus"
2件中 1-2の結果を表示しています
  • Mitsuaki AKIYAMA, Makoto IWAMURA, Yuhei KAWAKOYA, Kazufumi AOKI, Mitsutaka ITOH
    IEICE Transactions on Communications
    2010年 E93.B 巻 5 号 1131-1139
    発行日: 2010/05/01
    公開日: 2010/05/01
    ジャーナル 認証あり
    Nowadays, the number of web-browser targeted attacks that lead users to adversaries' web sites and exploit web browser vulnerabilities is increasing, and a clarification of their methods and countermeasures is urgently needed. In this paper, we introduce the design and implementation of a new client honeypot for drive-by-download attacks that has the capacity to detect and investigate a variety of malicious web sites. On the basis of the problems of existing client honeypots, we enumerate the requirements of a client honeypot: 1) detection accuracy and variety, 2) collection variety, 3) performance efficiency, and 4) safety and stability. We improve our system with regard to these requirements. The key features of our developed system are stepwise detection focusing on exploit phases, multiple crawler processing, tracking of malware distribution networks, and malware infection prevention. Our evaluation of our developed system in a laboratory experiment and field experiment indicated that its detection variety and crawling performance are higher than those of existing client honeypots. In addition, our system is able to collect information for countermeasures and is secure and stable for continuous operation. We conclude that our system can investigate malicious web sites comprehensively and support countermeasures.
  • Ruhui ZHANG, Makoto IWATA
    IEICE Transactions on Communications
    2008年 E91.B 巻 10 号 3251-3261
    発行日: 2008/10/01
    公開日: 2010/03/01
    ジャーナル 認証あり
    The development of network technology reveals the clear trend that mobile devices will soon be equipped with more and more network-based functions and services. This increase also results in more intrusions and attacks on mobile devices; therefore, mobile security mechanisms are becoming indispensable. In this paper, we propose a novel signature matching scheme for mobile security. This scheme not only emphasizes a small resource requirement and an optimal scan speed, which are both important for resource-limited mobile devices, but also focuses on practical features such as stable performance, fast signature set updates and hardware implementation. This scheme is based on the finite state machine (FSM) approach widely used for string matching. An SRAM-based two-level finite state machine (TFSM) solution is introduced to utilize the unbalanced transition distribution in the original FSM to decrease the memory requirement, and to shorten the critical path of the single-FSM solution. By adjusting the boundary of the two FSMs, optimum memory usage and throughput are obtainable. The hardware circuit of our scheme is designed and evaluated by both FPGA and ASIC technology. The result of FPGA evaluation shows that 2,168 unique patterns with a total of 32,776 characters are stored in 177.75KB SelectRAM blocks of Xilinx XC4VLX40 FPGA and a 3.0Gbps throughput is achieved. The result of ASIC evaluation with 180nm-CMOS library shows a throughput of over 4.5Gbps with 132KB of SRAM. Because of the small amount of memory and logic cell requirements, as well as the scalability of our scheme, higher performance is achieved by instantiating several signature matching engines when more resources are provided.
feedback
Top