期刊文献+

一种Linux文件入侵检测系统模型——LFIDS

An Intrusion Detection System Model For Linux File-LFIDS
下载PDF
导出
摘要 Linux操作系统中,文件系统的安全关系到整个系统的安全,因此文件系统常常是黑客入侵的主要目标.提出了一种Linux文件入侵检测系统模型、该系统利用自然免疫原理,采用否定选择算法构建基准规则库,利用RISE的思想对文件系统进行备份存储,提高了备份数据库的安全性.基于LKM技术,对特定的系统调用建立设障点,实现对Linux文件系统的针对性实时监控,减少了检测时间.一旦发现入侵,可及时终止进程,并通过回滚对被破坏文件进行及时修复.与同类系统模型相比,有效地减少了系统的开销和Linux内核的负载量,提高了检测效率和文件系统的安全系数.
出处 《计算机研究与发展》 EI CSCD 北大核心 2006年第z2期67-71,共5页 Journal of Computer Research and Development
  • 相关文献

参考文献12

  • 1陶利民,廖新辉.LIDS:一种基于Linux内核的入侵检测系统[J].计算机时代,2006(1):56-58. 被引量:1
  • 2张连杰,赵涛,吴灏,曾勇军.Linux入侵检测系统安全性分析[J].计算机工程与设计,2006,27(1):41-42. 被引量:2
  • 3[5]Anand Kashyap,Gopalan Sivathanu,Erez Zadok,et al.I3FS:An in-kernel integrity checker and intrusion detection file system.In:Proc of the 18th USENIX Large Installation System Administration Conf,LISA,2004
  • 4[7]Checker Gene H Kim,Eugene H.Spafford COAST Laboratory.The Design and Implementation of Tripwire:A File System Integrity.In:Proc of the 2nd ACM Conf on Computer and Communications Security.New York:ACM Press,1994
  • 5[8]Gene H Kim,Eugene H.Spafford COAST laboratory.Experiences with tripwire:Using integrity checkers for intrusion detection.Purdue University,Tech Rep:CSD-TR-94-012,1994
  • 6[9]S Forrest,A S Perelson,L Allen,et al.Self-nonself discrimination in a computer.In:Proc of the 1994 IEEE Symposium on Research in Security and Privacy.Los Alamitos,CA:IEEE Computer Society Press,1994
  • 7[10]Dennis L Chao,Stephanis Forrest.Information immune system.In:Int'l Conf on Artificial Immune Systems (ICARIS).2002.132-140
  • 8时金桥,方滨兴,胡铭曾,李斌.Linux系统调用劫持:技术原理、应用及检测[J].计算机工程与应用,2003,39(32):167-170. 被引量:11
  • 9王斌,须文波,冯斌.利用LKM的Linux审计功能实现[J].计算机工程,2004,30(3):136-138. 被引量:3
  • 10王永杰,刘京菊,孙乐昌.Linux可装载模块的开发与应用[J].计算机应用研究,2002,19(7):143-146. 被引量:4

二级参考文献17

  • 1Pragmatic.Linux可装载模块完全指南[EB/OL].http://www.thehackerschoice.com/papers/LKM HACKING.html.,2001.
  • 2..用LIDS增强系统安全[EB/OL]..http://www.eexpress.com/artide/12.php,,..
  • 3..LIDS攻略[EB/OL]..http://www.xfocus.net/articles/200202/362.html,,..
  • 4BUILD A SECURE SYSTEM WITH LIDS [EB/OL]. http://www.lids.org/.
  • 5Focus On Linux: Intrusion Detection on Linux[EB/OL]. http://www.securityfocus.com/.
  • 6[3]LIDS Hacking HOWTO[EB/OL].http://www.lids.org/lids-howto/,2004.10.5.
  • 7[4]Thomas H.Ptacek and Timothy N.Newshan.Insertion,Evasion,And Denial Of Service:Eluding Network Intrusion Detection.Technical Report,Secure Networks,Inc.January 1998.
  • 8[5]Eugene H Spafford,Diego Zamboni.Intrusion detection using autonomous agents[J].Computer Network,2000:34
  • 9[6]W.Lee S.J.Stolfo,and K.Mok.A Data Mining Framework for Building Intrusion Detection Models.Proceedings of the IEEE Symposium on Security and Privacy,1999.
  • 10[7]W Jansen,P Mell,T Karygiannis,and D Marks.Mobile agents in intrusion detection and response[A].The 12th Annual Canadian Information Technology Security Symposium[C].Ottawa,Canada,2000.

共引文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部