查看: 3477|回复: 9
收起左侧

[砖头] 来自nod32官网的介绍启发式的文章

[复制链接]
The EQs
发表于 2007-3-27 22:53:26 | 显示全部楼层 |阅读模式
http://www.eset.com/download/whi ... (Mar2007)Online.pdf



个人认为对于任何一个人都是具有参考价值的文章。。。。

评分

参与人数 1经验 +3 收起 理由
曲中求 + 3 感谢提供分享

查看全部评分

风野胤
发表于 2007-3-27 22:58:01 | 显示全部楼层
在同学那
回去下了看
nod的启发
曲中求
发表于 2007-3-27 23:01:17 | 显示全部楼层
内容不错,收藏学习了。。。。

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
The EQs
 楼主| 发表于 2007-3-27 23:01:57 | 显示全部楼层
What Does Heuristic Really Mean?
“Heuristic” refers to the act or process of finding or discovering. The Oxford English Dictionary defines heuristic as “enabling a person to discover or learn something for themselves” or (in the computing context) “proceeding to a solution by trial and error or by rules that are only loosely defined”. [6] The Merriam-Webster Dictionary defines it as “an aid to learning, discovery, or problem-solving by experimental and especially trial-and-error methods” or (again, in the context of computing) “relating to exploratory problem-solving techniques that utilize self-educating techniques (as the evaluation of feedback) to improve performance.” [7]
Heuristic programming is usually regarded as an application of artificial intelligence, and as a tool for problem solving. Heuristic programming, as used in expert systems, builds on rules drawn from experience, and the answers generated by such a system get better as the system “learns” by further experience, and augments its knowledge base.
As it is used in the management of malware (and indeed spam and related nuisances), heuristic analysis, though closely related to these elements of trial-and-error and learning by experience, also has a more restricted meaning. Heuristic analysis uses a rule-based approach to diagnosing a potentially-offending file (or message, in the case of spam analysis). As the analyzer engine works through its rule-base, checking the message against criteria that indicate possible malware, it assigns score points when it locates a match. If the score meets or exceeds a threshold score [8], the file is flagged as suspicious (or potentially malicious or spammy) and processed accordingly.
In a sense, heuristic anti-malware attempts to apply the processes of human analysis to an object. In the same way that a human malware analyst would try to determine the process of a given program and its actions, heuristic analysis performs the same intelligent decision-making process, effectively acting as a virtual malware researcher. As the human malware analyst learns more from and about emerging threats he or she can apply that knowledge to the heuristic analyzer through programming, and improve future detection rates.
Heuristic programming has a dual role in AV performance: speed and detection. In fact, the term heuristic is applied in other areas of science [9] in a very similar sense; aiming to improve performance (especially speed of throughput) through a “good enough” result rather than the most exact result. As the total number of known viruses has increased, so has the need to improve detection speed. Otherwise the increased time needed to scan for an ever-increasing number of malicious programs would make the system effectively unusable.
Despite the much-improved performance of some contemporary heuristic engines, there is
Heuristic analysis uses a rule-based approach to diagnosing a potentially-offending file (or message, in the case of spam analysis).
Heuristic Analysis – Detecting Unknown Viruses
a danger that the impact of heuristic (and even non-heuristic) scanning may be seen as outweighing the advantages of improved detection. There is a common belief that heuristic scanners are generally slower than static scanners, but at a certain point of sophistication this ceases to be true.
Even early heuristic scanners using simple pattern detection benefited from optimization techniques that searched only the parts of an object where a given virus could be expected to be found. (A simple example - there’s no point in scanning an entire file for a virus signature, if that virus always stores its core code at the beginning or end of an infected file.) This reduces scanning overhead and lessens the risk of a false positive.
The inappropriate detection of a viral signature in a place where the virus would never be found in normal circumstances is not only a side effect of poor detection methodology, but a symptom of poorly designed detection testing. For instance, some testers have attempted to test the capabilities of an AV program by inserting virus code randomly into a file or other infectible object. Similarly, a particular kind of object such as a file or boot sector can be selectively scanned for only those types of malware that can realistically be expected to be found in that object, a process sometimes described as “filtering”. After all, there’s no reason to look for macro virus code in a boot sector.
However, correct identification of a file type is not concrete proof of an uncontaminated file. For example, Microsoft Word document files containing embedded malicious executables have long been a major attack vector for information theft and industrial espionage. Similarly, malware authors are constantly in search of attacks where an object not normally capable of executing code can be made to do so for example, by modifying the runtime environment. W32/Perrun, for example, appended itself to .JPG and .TXT files, but could not actually run unless specific changes
monsoon1986
发表于 2007-3-28 00:08:04 | 显示全部楼层
english。。。得花段时间解读了
ballakay
发表于 2007-3-28 21:08:11 | 显示全部楼层
有中文就好了!
larphil
发表于 2007-3-28 23:24:08 | 显示全部楼层
喷血了,都是豆芽。。。
blueskyy
发表于 2007-3-28 23:28:14 | 显示全部楼层
eq,给欧们反映下下吧。
傻猪猪米走鸡
发表于 2007-3-29 09:49:27 | 显示全部楼层
看过了!谢谢!
deane_tiantian
发表于 2007-3-29 10:11:53 | 显示全部楼层
回家看看,还不错啊
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2024-4-25 10:14 , Processed in 0.138111 second(s), 19 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表