期刊文献+

基于系统调用的异常入侵检测研究 被引量:3

Anomaly Detection Research Based on System Calls
下载PDF
导出
摘要 基于时序、频率等特性,系统调用序列已成为基于主机的入侵检测系统重要的数据源之一。通过分析系统调用序列来判断入侵事件,具有准确性高、误警率低和稳定性好等优点,目前,国际上在这方面的研究主要集中在如何设计有效的检测算法以提高检测效果。该文对目前国际上基于系统调用的异常入侵检测方面的研究进展进行了总结,对主要的检测技术进行了详细讨论和分析。 System calls have already became an important data source of hosts-based intrusion detection system based on its sequential and frequency characteristics.The method whether an event is intrusion through analyzing system calls,has the virtues of high accuracy,low false fault and good stability and so on.At present ,the international research mainly focuses on how to design effective detection algorithms for improving detective effect.This paper summarizes the research progress of anomaly detection based on system calls,discusses and analyzes its main detection technology in detail.
出处 《计算机工程与应用》 CSCD 北大核心 2004年第17期40-43,共4页 Computer Engineering and Applications
基金 国家自然科学基金项目(编号:60083007) 国家863高技术研究发展计划项目(编号:2003AA144030) 国家973重点基础研究发展规划项目(编号:G1999035810) 中科院软件所基础课题研究基金项目(编号:CXK45634)
关键词 系统调用 异常入侵检测 时间特性 频率特性 system call,anomaly intrusion detection,time characteristic,frequency characteristic
  • 相关文献

参考文献25

  • 1D E Denning. An intrusion-detection model[J].IEEE Trans Softw Eng,1987; SE- 13: 222~232
  • 2C Ko,G Fink,K Levitt. Automated detection of vulnerabilities in priviledged programs by execution monitoring[C].In:proceedings of the 10th Annual Computer Security Applications Conference, 1994-12-5~9:134~144
  • 3C Ko,M Ruschitzka,K Levitt. Execution monitoring of security-critical programs in distributed systems:A specification-based approach[C].In:Proc IEEE Symposium on Security and Privacy,1997:134~144
  • 4G Fink, K Levitt. Property-based testing of privileged programs[C].In:Proceedings of the 10th Annual Computer Security Applications Conference, 1994-12-5~9: 154~163
  • 5S Forrest,S A Hofmeyr,A Somayaji et al.A sense of self for unix processes[C].In :Proceedings of the IEEE symposium on security and privacy, 1996: 120~128
  • 6S A Hofmeyr,S Forrest,A Somayaji.Intrusion detect using sequences of system calls[J].Journal of Computer Security,1998;6:151~180
  • 7C Warrender,S Forrest,B Pearlmutter. Detecting Intrusions using system calls:Alternative data models[C].In:Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999-05
  • 8H Debar,M Dacier,M Nassehi et al.Fixed vs.variable-length patterns for detecting suspicious process behavior[C].In:Jean-Jacques Quisquater,Yves Deswarte,Catherine Meadows eds. Computer Security-ESORICS 98,5th European Symposium on Research in Computer Security,LNCS,Louvain-la-Neuve, Belgium, 1998-09:1~15
  • 9A Wespi,M Dacier,H Debar. Intrusion detection using variable-length audit trail patterns[C].In: RAID 2000, LNCS 1907, Springer-verlag Berlin Heidelberg 2000,2000:110~129
  • 10A Wespi,H Debar,M Dacier et al.Fixed vs.variable-length patterns for detecting suspicious process behavior[J].Journal of Computer Security,2000:159~181

同被引文献33

  • 1卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:231
  • 2潘志松,罗隽,倪桂强,胡谷雨.基于支持向量描述的人工免疫检测算法[J].哈尔滨工程大学学报,2006,27(B07):302-306. 被引量:2
  • 3林果园,郭山清,黄皓,曹天杰.基于动态行为和特征模式的异常检测模型[J].计算机学报,2006,29(9):1553-1560. 被引量:25
  • 4Fink G,Levitt K.Property-based Testing of Privileged Programs[C].Proceedings of the 10th Annual Computer Security Applications Conference,1994.154-163.
  • 5Hopcroft J E,J D Ullman.Introduction to Automata Theory,Languages,and Computation[M].Addison-Wesley,1979.30-78.
  • 6苏璞睿.基于特权进程行为的入侵检测方法研究[D].北京:中国科学院软件所,2005.15-30
  • 7DENNING D E. An intrusion-detection model[ J ]. IEEE Trans on Software Engineering, 1987, SE-13(2) ::222-232.
  • 8FORREST S, HOFMEYR S A, SOMAYAJI A, et al. A sense of self for UNIX processes [ C ]//Proc of IEEE Symposium on Security and Privacy. Washington DC : IEEE Computer Society, 1996 : 120-128.
  • 9DEBAR H, DACIER M, NASSEHI M, et al. Fixed vs. variablelength patterns for detecting suspicious process behavior [C]// QUISQUATER J, DESWARTE Y, MEADOWS C. Proc of the 5th European Symposium on Research in Computer Security. London: Springer-Verlag, 1995: 1-15.
  • 10MARCEAU C. Characterizing the behavior of a program using multiple length n-grams[ C ]//Proc of the New Security Paradigms Workshop. New York: ACM Press, 2000: 68-74.

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部