On the study of one way to detect anomalous program execution
https://doi.org/10.18255/1818-1015-2024-2-152-163
Abstract
About the Authors
Yury V. KosolapovRussian Federation
Tatjyana A. Pavlova
Russian Federation
References
1. K. Lee, J. Lee, and K. Yim, “Classification and analysis of malicious code detection techniques based on the APT attack,” Applied Sciences, vol. 13, no. 5, p. 2894, 2023.
2. A. Hofmeyr, S. Forrest, and A. Somayaji, “Intrusion detection using sequences of system calls,” Journal of computer security, vol. 6, no. 3, pp. 151–180, 1998.
3. D. Wagner and P. Soto, “Mimicry attacks on host-based intrusion detection systems,” in Proceedings of the 9th ACM conference on Computer and communications security, 2002, pp. 255–264.
4. Y. Kosolapov, “On one method for detecting exploitation of vulnerabilities and its parameters,” Sistemy i Sredstva Informatiki [Systems and Means of Informatics], vol. 31, no. 4, pp. 48–60, 2021.
5. Y. Kosolapov, “On the Detection of Exploitation of Vulnerabilities That Leads to the Execution of a Malicious Code,” Automatic Control and Computer Sciences, vol. 55, pp. 827–837, 2021.
6. R. Batra, “API monitor.” 2013, Accessed: Apr. 21, 2024. [Online]. Available: http://www.rohitab.com/apimonitor.
7. A. Kechahmadze and Y. Kosolapov, “Method for detecting exploits based on the profile of differences between function call addresses,” Informatika i sistemy upravleniya, vol. 73, no. 3, pp. 106–116, 2022.
8. “Exploit Protection Reference.” 2023, Accessed: Apr. 21, 2024. [Online]. Available: https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/exploit-protection-reference?view=o365-worldwide.
9. A. Sweigart, “PyAutoGUI documentation.” 2021, Accessed: Apr. 21, 2024. [Online]. Available: https://readthedocs.org/projects/pyautogui/downloads/pdf/latest/.
10. Y. Ding, T. Wei, H. Xue, Y. Zhang, C. Zhang, and X. Han, “Accurate and efficient exploit capture and classification,” Science China. Information Sciences, vol. 60, pp. 052110:1–052110:17, 2017.
Review
For citations:
Kosolapov Yu.V., Pavlova T.A. On the study of one way to detect anomalous program execution. Modeling and Analysis of Information Systems. 2024;31(2):152-163. (In Russ.) https://doi.org/10.18255/1818-1015-2024-2-152-163