英文摘要
|
The popularization of the Internet has made the buffer overflow attack become one of the favorite attacks used by hackers and the most concern in the information security field. Therefore, the buffer overflow attack also becomes one of the foci of the antivirus software nowadays. It is reported that there has been malicious buffer overflow codes embedded in the digital images to avoid the detection of anti-virus systems. Steganalytic techniques use statistical analysis to detect the existence of the embedded information. The purpose of this paper is to propose a steganalysis-based technique to detect the embedded malicious code. Meanwhile, the support vector machine (SVM) is integrated with the proposed technique to provide an automatic mechanism to solve the problem of tuning the parameters used in the proposed technique. Experimental results show that the proposed technique can effectively detect the malicious code embedded in the innocent images. The achievement of this study can be integrated with antivirus software to avoid this kind of information security accidents.
|
参考文献
|
-
劉江龍、婁德權、江天賜、李建中、曾馭(2007)。以資訊隱藏為基礎之惡意程式攻擊技術。2007危機管理國際學術研討會論文集,台中:
連結:
-
Steganos
-
CBIR Image Database
-
S-Tools
-
Hide and Seek
-
Jpeg-steg
-
EzStego
-
Bender, W.,Gruhl, D.,Morimoto, N.,Lu, A.(1996).Techniques for Data Hiding.IBM Systems Journal,35(3-4),313-337.
-
Chen, T.-S.,Chang, C.-C.,Hwang, M.-S.(1998).A Virtual Image Cryptosystem Based Upon Vector Quantization.IEEE Transactions on Image Processing,7(10),1485-1488.
-
Microsoft Security Bulletin MS04-028
-
Mielikainen, J.(2006).LSB Matching Revisited.IEEE Signal Processing Letters,13(5),285-287.
-
Salzberg, S. L.(1997).On Comparing Classifiers: Pitfalls to Avoid and a Recommended Approach.Data Mining and Knowledge Discovery,1(3),317-327.
-
W32.Perrun
-
Vapnik, V. N.(1995).The Nature of Statistical Learning Theory.Germany:Springer-Verlag.
-
Walton, S.(1995).Image Authentication for a Slippery New Age.Dr. Dobb's Journal,20(4),18-26.
-
Westfeld, A.,Pfitzmann, A.(1999).Attacks on Steganographic Systems.Proceedings of the 3rd International Workshop on Information Hiding.
-
陳同孝、張真誠、黃國峰(2003)。數位影像處理技術。台北:旗標出版股份有限公司。
|