CN116894250A - Malicious software detection method for air traffic control system - Google Patents

Malicious software detection method for air traffic control system Download PDF

Info

Publication number
CN116894250A
CN116894250A CN202310872097.4A CN202310872097A CN116894250A CN 116894250 A CN116894250 A CN 116894250A CN 202310872097 A CN202310872097 A CN 202310872097A CN 116894250 A CN116894250 A CN 116894250A
Authority
CN
China
Prior art keywords
software
malicious
code
codes
traffic control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310872097.4A
Other languages
Chinese (zh)
Inventor
贾如春
张建伟
张中南
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan University
Original Assignee
Sichuan University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan University filed Critical Sichuan University
Priority to CN202310872097.4A priority Critical patent/CN116894250A/en
Publication of CN116894250A publication Critical patent/CN116894250A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management
    • G06F8/71Version control; Configuration management

Abstract

The invention discloses a method for detecting malicious software of an air traffic control system, which belongs to the technical field of air traffic control systems and specifically comprises the following steps: s1, importing new software, analyzing and disassembling the software, and analyzing a software code; s2, collecting malicious codes and establishing a malicious code database; according to the method, a malicious code database is established, a neural network identification system is combined, after a new software code is imported, a plurality of nodes are connected with the new software code through a plurality of channels, the software code is identified in the same time, the software code is analyzed, whether the malicious code exists or not is judged, meanwhile, undetected suspicious codes are marked, the running smoothness of the new software is detected through a cloud system, and a software version which still has problems is run, so that the existence of the malicious code is proved, the newly developed malicious software or the software code can be effectively identified, the purpose of effective identification is achieved, and the risk of opening the software is greatly reduced.

Description

Malicious software detection method for air traffic control system
Technical Field
The invention belongs to the technical field of air traffic control systems, and particularly relates to a method for detecting malicious software of an air traffic control system.
Background
The air traffic control system is a control system which monitors and controls the aircraft by using a technical means, prevents collision in the air or on the ground, and guides the aircraft to take off and land safely on time. The air traffic control radar is responsible for collecting and transmitting various information of the aircraft in the responsibility area to the flight control center in the air traffic control system, so that the requirements of flight control are met.
The empty pipe system is often attacked by malicious software, some software for containing information is received in the running process, however, malicious viruses may exist in the opened software, so that the empty pipe system is affected, the existing malicious software identification system can only identify the existing malicious software or malicious codes in the malicious software, but if the existing malicious software or malicious codes are newly developed, the purpose of effective identification cannot be achieved, and therefore, the opened software still has a great risk.
Disclosure of Invention
The invention aims at: the method for detecting the malicious software of the air traffic control system aims at solving the problems that the existing malicious software identification system can only identify existing malicious software or malicious codes in the malicious software, but can not achieve the purpose of effective identification if the existing malicious software or the malicious codes are newly developed, so that the problem that the open software is at great risk exists.
In order to achieve the above purpose, the present invention adopts the following technical scheme:
a method for detecting malicious software of an air traffic control system specifically comprises the following steps:
s1, importing new software, analyzing and disassembling the software, and analyzing a software code;
s2, collecting malicious codes and establishing a malicious code database;
s3, a neural network identification system is established, malicious code data are imported, and the malicious code data are used for identifying malicious codes in software;
s4, eliminating malicious codes and marking unidentified suspicious codes;
s5, establishing a cloud system, importing new software to run, and testing the running state of the new software;
s6, locking malicious codes according to the running state of the new software;
s7, performing software repair.
As a further description of the above technical solution:
in the step S1, the analyzed software codes are imported into a conventional code recognition model, the non-conventional codes are recognized, and the non-conventional codes are marked respectively, so that the quick locking in the detection process is facilitated, and the software codes are imported into a neural network recognition system.
As a further description of the above technical solution:
in the step S2, after the malicious code database is established, the internet large database is connected through a network, a malicious code classification group in the corresponding industry field is searched, malicious codes of the internet large database are extracted, the malicious code database needs to be kept updated every day, the malicious code database is ensured to be consistent with malicious code data in the internet large database, the malicious code database is used for preventing new malicious codes from being utilized, and malicious software is manufactured according to time difference and information difference to be destroyed.
As a further description of the above technical solution:
in the step S3, the malicious code is stored in a plurality of nodes in the neural network recognition system, after the new software code is imported, the plurality of nodes are connected with the new software code through a plurality of channels, the software code is recognized in the same time, the software code is analyzed, whether the malicious code exists or not is judged, and meanwhile, the recognition efficiency is higher.
As a further description of the above technical solution:
in S4, the malicious code can be removed, and after the suspicious code is marked, the suspicious code can be imported into the new software along with the marking signal.
As a further description of the above technical solution:
in the step S5, the main purpose of the test software is to detect the running smoothness of the new software, divide the running period of the software into three periods, namely, front, middle and rear periods, and analyze the running speed and state of the three-stage software respectively, if the running speed of the software in any one period is found to be slow or extremely fast, and the situation that multiple times of blocking, delay or network fluctuation is caused in the running process is detected and marked.
As a further description of the above technical solution:
in the S6, by analyzing the running state, the problem of the three periods before, during and after can be analyzed, the time point of the problem of the running of the software is recorded, the position of the time point corresponds to the marked suspicious malicious code in the software, and the malicious code with the highest malicious probability can be detected rapidly.
As a further description of the above technical solution:
in the step S7, a plurality of cloud systems are established in the testing process, malicious codes with high suspicious degree are deleted or modified, the purpose of modifying software is achieved, a plurality of modified software versions are respectively sent to different cloud systems for running, and running of the software versions still having problems proves that the malicious codes exist in the cloud systems.
In summary, due to the adoption of the technical scheme, the beneficial effects of the invention are as follows:
according to the method, a malicious code database is established, a neural network identification system is combined, after a new software code is imported, a plurality of nodes are connected with the new software code through a plurality of channels, the software code is identified in the same time, the software code is analyzed, whether the malicious code exists or not is judged, meanwhile, undetected suspicious codes are marked, the running smoothness of the new software is detected through a cloud system, the malicious code with the highest malicious probability is detected rapidly by corresponding to the marked suspicious malicious code in the software, a plurality of cloud systems are established in the testing process, the malicious code with the high suspicious degree is deleted or modified, the purpose of modifying the software is achieved, a plurality of modified software versions are respectively transmitted to different cloud systems to run, the running of the software version still having problems is proved, the newly developed malicious software or the software code can be effectively identified, the purpose of effective identification is achieved, and the risk of opening the software is greatly reduced.
Detailed Description
The technical solutions of the embodiments of the present invention will be clearly and completely described below in conjunction with the embodiments of the present invention, and it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The invention provides a technical scheme that: a method for detecting malicious software of an air traffic control system specifically comprises the following steps:
s1, importing new software, analyzing and disassembling the software, and analyzing a software code, wherein in the S1, the analyzed software code is imported into a conventional code identification model, non-conventional codes are identified, and the non-conventional codes are marked respectively, so that the software is conveniently and rapidly locked in a detection process and imported into a neural network identification system;
s2, collecting malicious codes and establishing a malicious code database, wherein in the S2, the malicious code database is connected with an Internet large database through a network after being established, a malicious code classification group in the corresponding industry field is searched, the malicious codes of the Internet large database are extracted, the malicious code database needs to be kept updated every day, the consistency with malicious code data in the Internet large database is ensured, the malicious code database is used for preventing the new malicious codes from being utilized, and malicious software is manufactured according to time difference and information difference to be destroyed;
s3, establishing a neural network identification system, importing malicious code data for identifying malicious codes in software, wherein in S3, the malicious codes are stored in a plurality of nodes in the neural network identification system, after a new software code is imported, the nodes are connected with the new software code through a plurality of channels, the software code is identified in the same time, the software code is analyzed, whether the malicious code exists or not is judged, and meanwhile, the identification efficiency is higher;
s4, eliminating malicious codes and marking unidentified suspicious codes, wherein in the S4, the malicious codes can be eliminated, and after the suspicious codes are marked, the suspicious codes can be imported into new software along with marking signals;
s5, establishing a cloud system, importing new software to run, and testing the running state of the new software, wherein in S5, the testing software mainly aims at detecting the running smoothness of the new software, dividing the running period of the software into front, middle and rear three periods, respectively analyzing the running speed and the running state of the three-stage software, and if the running speed of the software in any one period is found to be slow or extremely fast, and a plurality of times of blocking, delay or conditions causing large network fluctuation are detected and marked;
s6, locking malicious codes according to the running state of the new software, wherein in the S6, by analyzing the running state, the problem of the occurrence of the problem in the front, middle and rear three stages can be analyzed, the time point of the problem of the running of the software is recorded, the position of the time point corresponds to the marked suspicious malicious codes in the software, and the malicious code with the highest malicious probability can be detected rapidly;
s7, repairing software, wherein in S7, a plurality of cloud systems are established in the testing process, malicious codes with high suspicious degree are deleted or modified, the purpose of modifying the software is achieved, the plurality of modified software versions are respectively sent to different cloud systems for running, and the running of the software versions still having problems proves that the malicious codes exist in the cloud systems.
The foregoing is only a preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art, who is within the scope of the present invention, should make equivalent substitutions or modifications according to the technical scheme of the present invention and the inventive concept thereof, and should be covered by the scope of the present invention.

Claims (8)

1. The method for detecting the malicious software of the air traffic control system is characterized by comprising the following steps of:
s1, importing new software, analyzing and disassembling the software, and analyzing a software code;
s2, collecting malicious codes and establishing a malicious code database;
s3, a neural network identification system is established, malicious code data are imported, and the malicious code data are used for identifying malicious codes in software;
s4, eliminating malicious codes and marking unidentified suspicious codes;
s5, establishing a cloud system, importing new software to run, and testing the running state of the new software;
s6, locking malicious codes according to the running state of the new software;
s7, performing software repair.
2. The method for detecting malicious software in an air traffic control system according to claim 1, wherein in S1, the parsed software codes are imported into a conventional code recognition model, non-conventional codes are recognized, and the non-conventional codes are marked respectively, so that the method is convenient to lock quickly in the detection process and is imported into a neural network recognition system.
3. The method for detecting malicious software in an air traffic control system according to claim 1, wherein in S2, after the malicious code database is established, the internet big database is connected through a network, a malicious code classification group in a corresponding industry field is searched, malicious codes in the internet big database are extracted, and the malicious code database needs to be kept updated every day to ensure consistency with malicious code data in the internet big database.
4. The method for detecting malicious software in an air traffic control system according to claim 1, wherein in S3, malicious codes are stored in a plurality of nodes in the neural network recognition system, after a new software code is introduced, the plurality of nodes are connected with the new software code through a plurality of channels, the software code is recognized at the same time, the software code is analyzed, whether the malicious code exists is judged, and at the same time, the recognition efficiency is higher.
5. The method for detecting malicious software in an air traffic control system according to claim 1, wherein in S4, the malicious code can be removed, and the suspicious code can be imported into new software along with the marking signal after being marked.
6. The method for detecting malicious software in an air traffic control system according to claim 1, wherein in S5, the test software is mainly aimed at detecting the running smoothness of the new software, dividing the running period of the software into three periods of front, middle and rear, and analyzing the running speed and state of the three-stage software respectively, and if the running speed of the software in any one period is found to be slow or extremely fast, and a plurality of times of blocking, delay or cause a large network fluctuation in the running process are detected and marked.
7. The method for detecting malicious software in an air traffic control system according to claim 1, wherein in S6, by analyzing the operation status, it is possible to analyze where problems occur in the first, second and third phases, and record the time point when the problems occur in the operation of the software, and perform location correspondence with the suspicious malicious code marked in the software, so that the malicious code with the highest malicious probability can be detected quickly.
8. The method for detecting malicious software in an air traffic control system according to claim 1, wherein in S7, a plurality of cloud systems are established in the testing process, malicious codes with high suspicious degree are deleted or modified to achieve the purpose of modifying software, and a plurality of modified software versions are respectively sent to different cloud systems for running, and running software versions still having problems proves that malicious codes exist therein.
CN202310872097.4A 2023-07-17 2023-07-17 Malicious software detection method for air traffic control system Pending CN116894250A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310872097.4A CN116894250A (en) 2023-07-17 2023-07-17 Malicious software detection method for air traffic control system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310872097.4A CN116894250A (en) 2023-07-17 2023-07-17 Malicious software detection method for air traffic control system

Publications (1)

Publication Number Publication Date
CN116894250A true CN116894250A (en) 2023-10-17

Family

ID=88314611

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310872097.4A Pending CN116894250A (en) 2023-07-17 2023-07-17 Malicious software detection method for air traffic control system

Country Status (1)

Country Link
CN (1) CN116894250A (en)

Similar Documents

Publication Publication Date Title
CN110213077B (en) Method, device and system for determining safety event of power monitoring system
CN112114995B (en) Terminal abnormality analysis method, device, equipment and storage medium based on process
NL2012421A (en) Computer-implemented systems and methods for comparing and associating objects.
CN109347853B (en) Deep packet analysis-based anomaly detection method for integrated electronic system
CN105100122A (en) Threat detection and alert method and system based on big data analysis
CN113422763B (en) Alarm correlation analysis method constructed based on attack scene
CN105376193A (en) Intelligent association analysis method and intelligent association analysis device for security events
CN113064932A (en) Network situation assessment method based on data mining
CN115643035A (en) Network security situation assessment method based on multi-source log
CN115269314A (en) Transaction abnormity detection method based on log
CN117081858A (en) Intrusion behavior detection method, system, equipment and medium based on multi-decision tree
Hendry et al. Intrusion signature creation via clustering anomalies
KR101444250B1 (en) System for monitoring access to personal information and method therefor
CN112600828B (en) Attack detection and protection method and device for power control system based on data message
CN114244594A (en) Network flow abnormity detection method and detection system
WO2018110997A1 (en) Method and apparatus for generating network intrusion detection rule
Werner et al. Near real-time intrusion alert aggregation using concept-based learning
CN116894250A (en) Malicious software detection method for air traffic control system
CN110399485B (en) Data tracing method and system based on word vector and machine learning
CN111104670B (en) APT attack identification and protection method
CN117082453A (en) Vehicle electronic fence alarm method, device, equipment and storage medium
CN109324985A (en) A kind of SQL injection recognition methods of the automatic adaptation scene based on machine learning
CN113162904B (en) Power monitoring system network security alarm evaluation method based on probability graph model
CN102882893A (en) Alarming cooperative system based on blackboard structure
CN113536322A (en) Intelligent contract reentry vulnerability detection method based on countermeasure neural network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination