Indonesian Journal of Electrical Engineering and Computer Science
Vol 12, No 3: March 2014

A Detection method based on Control Flow Graph for Cisco IOS Security

Sheng-li Liu (State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou)
Xiang Gao (State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou)
Cheng Zeng (State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou)
Li-gen Chen (State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou)



Article Info

Publish Date
01 Mar 2014

Abstract

Aiming at the problem of current analysis and detection techniques against Cisco IOS security are not suitable for IOS integrality attack, this paper focuses on the Cisco IOS security detection techniques based on Control Flow Graph. First, the constructing method of Control Flow Graph is introduced. Then, a method to extract non-executed malicious code is proposed, which improves the effectiveness and accuracy of the analysis of malicious code. It provides support for rapid and effective detection of IOS integrality attack. DOI : http://dx.doi.org/10.11591/telkomnika.v12i3.4561

Copyrights © 2014