A Detection method based on Control Flow Graph for Cisco IOS Security

Sheng-li Liu, Xiang Gao, Xiang Gao, Cheng Zeng, Cheng Zeng, Li-gen Chen

Abstract


Aiming at the problem of current analysis and detection techniques against Cisco IOS security are not suitable for IOS integrality attack, this paper focuses on the Cisco IOS security detection techniques based on Control Flow Graph. First, the constructing method of Control Flow Graph is introduced. Then, a method to extract non-executed malicious code is proposed, which improves the effectiveness and accuracy of the analysis of malicious code. It provides support for rapid and effective detection of IOS integrality attack.

 

DOI : http://dx.doi.org/10.11591/telkomnika.v12i3.4561


Keywords


Cisco IOS; Control Flow Graph; integrality; security detection

Full Text:

PDF

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

The Indonesian Journal of Electrical Engineering and Computer Science (IJEECS)
p-ISSN: 2502-4752, e-ISSN: 2502-4760
This journal is published by the Institute of Advanced Engineering and Science (IAES) in collaboration with Intelektual Pustaka Media Utama (IPMU).

shopify stats IJEECS visitor statistics