期刊文献+

一种基于均值Hamming距离的异常入侵检测方法 被引量:1

Average Hamming Distance Based Anomaly Intrusion Detection
下载PDF
导出
摘要 对进程级的入侵检测技术进行了研究,提出了一种基于均值Hamming距离的异常入侵检测方法—AHDAD,监控对象为特权进程的系统调用序列,通过计算偏离量检测入侵。AHDAD算法简单、检测准确率高、时间开销小,使实时入侵检测成为可能。最后,用原型实验证实了方法的可行性。 The intrusion detection techniques at the level of system processes are discussed, and a new method named AHDAD (Average Hamming Distance-based Anomaly intrusion Detection) is presented, which can be used to monitor the sequences of system calls in privileged processes and calculate deviation to discriminate between normal and abnormal. The method has some advantages, such as algorithm simplicity, low overhead of time, high accuracy and real-time detection. The prototype experiment results prove the validation of it.
机构地区 哈尔滨工程大学
出处 《系统仿真学报》 CAS CSCD 2004年第12期2853-2856,共4页 Journal of System Simulation
基金 国防"十五"预研基金 (413150702)
关键词 入侵检测 均值Hamming距离 特权进程 系统调用 intrusion detection average hamming distance privileged process system call
  • 相关文献

参考文献12

  • 1J P Anderson. Computer Security Threat Monitoring and Surveillance [P]. USA: PA 19034, 1980, 4.
  • 2Theuns Verwoerd, Ray Hunt. Intrusion Detection Techniques and Approaches [J]. Computer Communications, 2002, 25 (15): 1356-1365.
  • 3Debra Anderson, Thane Frivold, Alfonso Valdes. Next-generation Intrusion Detection Expert System (NIDS): A summary [Z]. Tech. Rep. SRI-CSL-95-07, Computer Science Laboratory, SRI International, 1995, 5.
  • 4Henry S Teng, Kaihu Chen, Stephen C Lu. Security Audit Trail Analysis Using Inductively Generated Predictive Rules [A]. Proceedings of the sixth conference on artificial intelligence applications [C]. New Jersey, 1990, 24-29.
  • 5S Forrest, S A Hofmeyr, A Somayaji. A Sense of Self for Unix Process [A]. Proceedings of the 1996 IEEE Symposium on Research in Security and Privacy [C]. Orkland California: IEEE Computer Society Press, 1996, 120-128.
  • 6A Kosoresow, S Hofmeyr. Intrusion Detection via System Call Traces [J]. IEEE Software, 1997, 14(5): 35-42.
  • 7R Sekar, M Bendre, D Dhurjati, P Bollineni. A Fast Automaton- Based Method for Detecting Anomalous Program Behaviors [A]. IEEE Symposium on Security and Privacy [C]. 2001. 144-155.
  • 8Nittida Nuansri, Samar Singh, Tharam S. Dillon. A Process State-Transition Analysis and Its Application to Intrusion Detection [A]. Proceedings of ACSAC 1999 [C]. 1999, 378-388.
  • 9R Sekar, Thomas F Bowen, Mark E Segal. On Preventing Intrusions by Process Behavior Monitoring [A]. Workshop on Intrusion Detection and Network Monitoring 1999 [C]. 1999, 29-40.
  • 10William W Cohen. Fast Effective Rule Induction [A]. Machine Learning: Proceedings of the Twelfth International Conference [C]. Lake Tahoe, California, 1995.

同被引文献70

引证文献1

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部