Research and application of internal malicious code threat detection system

Zhang Xiaojun,Li Yingcai,Zhang Fuqiang,Zhang Qian,Han Li
DOI: https://doi.org/10.1145/3469213.3471388
2021-05-28
Abstract:With the continuous development of network technology, global informatization has become a reality. While the openness and interconnection of IP network protocols bring convenience to data communication, it also provides space for network intruders to enter the void. In particular, the terminal system design is fragile, the software running on the terminal is becoming more and more complicated, and its various components are interdependent, and vulnerabilities are prone to occur in the process of development and maintenance. 0day vulnerabilities emerge endlessly, and static protection methods have exposed deficiencies.
What problem does this paper attempt to address?