期刊文献+

一种进程系统调用重复子序列的压缩算法

A Method of Compressing Repeated Segments in System Call Sequences Executed by the Process
下载PDF
导出
摘要 以往入侵检测系统中采用的进程检测方法并未对进程系统调用序列中产生的重复子序列进行处理。本文提出了一种进程系统调用重复子序列的压缩算法,在系统调用序列收集过程中找出重复子序列,再将其作为一个整体参与模式的提取与检测。测试表明,对系统调用序列中的重复子序列进行压缩后能有效减少系统调用序列的长度,从而简化模式的学习和检测,提高进程检测的效率。 The intrusion detection methods based on process don't pay enough attention to short repeated sequences of system calls executed by running processes. This paper presents a method of compressing repeated segments in sys- tem call sequences run by the process. When collecting the system calls ,we mark the repeated sequences,which are treated as a whole to the process of pattern extraction. The data of experiment show that the length of the system call sequence is reduced after compressing the repeated sequences, to simplify the procedure of pattern study and detection and increase the efficiency.
出处 《计算机科学》 CSCD 北大核心 2004年第7期91-93,共3页 Computer Science
基金 国家自然科学基金(编号90104030) 安徽省"十五"科技攻关项目(编号01012013)支持
关键词 入侵检测 系统调用 变长模式 进程检测 压缩算法 子序列 Intrusion detection,System call,Variable-length-patterns,Detection based on process
  • 相关文献

参考文献8

  • 1[1]Forrest S,Hofmeyr S A,Somayaji A,Longstaff T A. A sense of self for Unix processes. Security and Privacy,1996. In:Proc. 1996IEEE Symposium on,1996. 120 ~128
  • 2[2]Hofmeyr S A, Forrest S, Somayaji A. Lightweight Intrusion Detection for Networked Operating Systems. http:∥www.cs. unm. edu/~immsec/publications/ids. pdf
  • 3[3]Wespi A,Dacier M ,Debar H. Intrusion Detection Using VariableLength Audit Trail Patterns, Recent Advances in Intrusion Detection - Lecture Notes in Computer Science ed. by H. Debar,L. Mé,S. F. Wu. ,Berlin,Springer-Verlag,vol. 1907,2000. 110~129
  • 4[4]Debar H, et al. Fixed vs. variable-length patterns for detecting suspicious process. In J. J. Quisquater,Y. Deswarte, C. Meadows,D. Gollmann, eds. Proc. of the 1998 ESORICS Conference, number 1485 in LNCS,sep. 1998.1~16
  • 5[5]Wespi A, Dacier M, Debar H. An Intrusion-Detection System Based on the Teiresias Pattern-Discovery Algorithm: [IBM Research Report]. 1999
  • 6[6]Eskin E,et al. Modeling System Calls for Intrusion Detection with Dynamic Window Sizes. http:∥wwwl. cs. columbia. edu/ids/publications/smt-syscall-discex01. pdf
  • 7[7]http:∥www. cs. unm. edu/~immsec/systemcalls. htm
  • 8[8]Jiang N,et al. Exploiting Pattern Relationship for Intrusion Detection. In:Proc. of the 2003 Symposium on Applications and the Internet, Jan. 2003. 200 ~208

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部