Malicious Software Detection System in a Virtual Machine Using Database

  • Hyun-woo Cheon
  • kyu-Won Lee
  • Sang-Ho Lee
  • Geuk Lee
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 206)


Malicious behavior detection using emulator or virtual machine is becoming an interesting issue in information security field because it is easy to re-initialize the system and execute codes in independent separate spaces which do not give any bad influence to the system. This paper proposes fast malicious codes detection system by using database of previous malicious codes.


virtual machine database malicious software detection 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Bacel, R., Mell, P.: Intrusion Detection Systems. NIST (2003)Google Scholar
  2. 2.
    Endorf, C., Schultz, E., Mellander, J.: Intrusion Detection & Prevention. McGraw-Hill, New York (2004)Google Scholar
  3. 3.
    Debar, H., Dacie, M., Wepsi, A.: A Revised Taxonomy for Intrusion- Detection Systems. IBM Report (1999)Google Scholar
  4. 4.
    Weaver, N., Paxson, V., Cunningham, R.: Taxonomy of Computer Worms. In: ACM CCS Workshop on Rapid Malcode (2003)Google Scholar
  5. 5.
  6. 6.
    National Cyber Security Center, Cyber Security, Personal authentication service (2010)Google Scholar
  7. 7.
    Seo, J.T.: Malicious Code Detection Technique in Virtual Environment (2007)Google Scholar
  8. 8.

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Hyun-woo Cheon
    • 1
  • kyu-Won Lee
    • 1
  • Sang-Ho Lee
    • 2
  • Geuk Lee
    • 1
  1. 1.Dept of Computer EngineeringHannam UniversityKorea
  2. 2.Dept of Military StudiesDaejeon UniversityKorea

Personalised recommendations