期刊文献+

一种面向计算网格U2R攻击的主机入侵检测技术

A Host-Based Computing Grid Intrusion Detection Technology for U2R Attack
下载PDF
导出
摘要 文中提出了一种针对计算网格U2R攻击的主机入侵检测技术,在主机层使用BV方法,以降低漏报率和误报率.在主机操作系统内核中使用基于整数比较实现的BV方法,不仅占用较小的系统开销,而且可对主机关键资源的使用进行检测.同时通过整合网格访问控制机制,在网格环境下准确地标识入侵者,并向网格中间件层提供网格用户使用主机资源的信息为进一步的用户行为分析提供支持. In the paper,a Host-based Intrusion Detection technology for computing grid was proposed which employs Bottleneck Verification(BV)approach to detect U2R intrusions with both low false alarm rate and high detection rate.Due to working inside operating system kernel and performing BV by integer comparison,the technology achieves more efficiency and accuracy.More important,for analyzing suspicious Grid user s behavior,instead of reporting suspicious events indexed by local user ID to high level Grid-based Intr...
出处 《微电子学与计算机》 CSCD 北大核心 2009年第2期1-4,共4页 Microelectronics & Computer
基金 国家自然科学基金项目(60773118) 国家“八六三”计划项目(2006AA01A109)
关键词 计算网格 主机入侵检测系统 U2R攻击 BV方法 computing grid host-based intrusion detection system U2R attack Bottleneck Verification
  • 相关文献

参考文献2

二级参考文献9

  • 1戴节勇,顾健,陈克非.PKI技术在网格安全中的应用[J].计算机工程,2005,31(5):159-161. 被引量:15
  • 2王进,孙怀江.DSm信任模型下的信任传递[J].微电子学与计算机,2006,23(9):215-217. 被引量:3
  • 3Josang A,Knapskog J S.A metric for trusted systems global IT security[C].Wien:Austrian Computer Sociey,1998:541-549
  • 4Syed Naqvi,Michel Riguidel.Threat Model for Grid Security Services[C].Advances in Grid Computing -EGC 2005:European Grid Conference,Amsterdam,The Netherlands,2005:1048-1055
  • 5Tuecke S.Grid security infrastructure (GSI) roadmap[EB/OL].http://www.gridforum.org/security/ggfl-2001-03/drafts/droft-gridforum-gsi-roadmap-02.txt,2001
  • 6Nataraj Nagaratnam,Philippe Janson.Security architecture for open grid services[EB/OL].http://www.globus.org/ogsa/Security/draft-ggf-ogsa-sec-arch-01.pdf
  • 7Chris Kaler,Anthony,Nadalin.Web services fed eration language (WS-Federation)[EB/OL].BEA and IBM and Microsoft and RSA Security and VeriSign,http://www-106.ibm.com/developerworks/webservices/library/ws-fed/,2003
  • 8刘大有,杨鲲,唐海鹰,陈建中,虞强源,陈桂芬.凸函数证据理论模型[J].计算机研究与发展,2000,37(2):175-181. 被引量:16
  • 9唐文,陈钟.基于模糊集合理论的主观信任管理模型研究[J].软件学报,2003,14(8):1401-1408. 被引量:236

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部