期刊文献+

关于异常检测中正常行为模式库创建算法的研究

The Normal Behavior Model Database Foundation Algorithm Research in Anomaly Detection
下载PDF
导出
摘要 基于程序行为的异常检测方法主要通过建立程序正常行为模式库来检测入侵。本文对异常检测中正常行为模式库的创建算法进行了研究,主要利用基于Teiresias算法的变长模式抽取方法构建程序正常行为模式库,并与TIDE方法作了比较。 As an important branch of the intrusion detection,the anomaly detection is attached importance by people more and more.The anomaly detection system may choose the monitoring object more,including user behavior,procedure behavior,document complete and so on.It detect the anomaly mainly through establishing the normal behavior model database that anomaly detection method based on the procedure behavior.The paper will research foundation algorithm of the normal behavior model database.I mainly establish a norm...
作者 于春花
机构地区 潍坊学院
出处 《潍坊学院学报》 2009年第2期33-35,共3页 Journal of Weifang University
关键词 异常检测 程序行为 正常行为模式库 Teiresias算法 anomaly detection procedure behavior normal behavior model database teiresias algorithm
  • 相关文献

参考文献3

二级参考文献24

  • 1[1]Forrest S ,Hofimeyr S A ,Somaysji A .A Sence od self for unix processes[C]. In: Proceeding of the 1996 IEEE Symposium on Security and Privacy :120-128.
  • 2[2]Jou Y, Gong F, Sargor C, Wu X et al.Design and implementation of a scalable intrusion detection system for the protection of network infrastructure[C]. DARPA Information Survivability Conference and Exposition, Hilton Head Island, SC. 2000:203-211.
  • 3[3]Eckmann S T, Vigna G and Kemmerer R, STATL: An attack language for state-based intrusion detection[C]. In:Proceeding of the ACM Workshop on Intrusion Dection, 2000,110-118.
  • 4[4]Vigna G, Eckmann S T, and Kemmerer R. The STAT tool suite[C]. In:Proceedings of the IEEE Information Survivability Workshop, Boston, October 2000,121-130.
  • 5Ilgun K, Kemmerer R A, Porras P A. State transition analysis: Arule-based intrusion detection approach [ J ].IEEE Trans on Software Engineer, 1995,21(3) : 181-199.
  • 6Rebecca Gurtey Bace. Intrusion detection[M]. Macmillan Tedmical Publishing USA, 1999.
  • 7冯登国.计算机通信网络安全[M].北京:清华大学出版社,2002..
  • 8RichardStevensW著 尤晋元译.Unix环境高级编程[M].北京:机械工业出版社,2000..
  • 9陈长念 陈勤意.网页新世界XML入门与应用[M].北京:中国青年出版社,2000..
  • 10吴淼.入侵者检测[M].北京:电子工业出版社,1999..

共引文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部