期刊文献+

基于主机系统调用序列的实时入侵检测系统的模型研究 被引量:1

Research on Real-Time Intrusion Detection System Based on Host System-Call Sequences
下载PDF
导出
摘要 首先介绍了基于主机系统调用的入侵检测的概念,进而说明了研究基于主机系统调用序列的实时入侵检测系统的重要性;然后提出了该系统的模型设计方案,包括结构分析、接口设计和相关算法;最后给出了仿真实验和实验数据分析。 In this paper, firstly, we introduce the concept of intrusion detection system based on host system-call, and explain the importance of researching real-time intrusion detection system based on system-call sequences. Then, we give a design mode, including framework analysis, interface designing and relative algorithms; At last, we present some simulating results and data analyzing.
出处 《南京邮电学院学报(自然科学版)》 2005年第1期72-75,共4页 Journal of Nanjing University of Posts and Telecommunications
基金 国家自然科学基金 (60173037和 70271050 ) 江苏省自然科学基金 (BK2003105和BK2004218 ) 国家高科技"八六三"计划 ( 2004AA775053 ) 江苏省计算机信息处理重点实验室基金 (KJS03061和KJS04 )资助项目
关键词 系统调用 实时 入侵检测 序列 System-call Real-time Intrusion detection Sequence
  • 相关文献

参考文献7

  • 1王泽芳,陈小平,史烈.基于系统调用监控的Linux入侵检测模型设计[J].计算机工程,2002,28(11):144-145. 被引量:3
  • 2戴英侠 连一峰 王航.系统安全与入侵检测[M].北京:清华大学出版社,2003..
  • 3NORTHCUTT S,COOPER M,FEARNOW M,et al. Intrusion Signatures and Analysis[M].北京:中国电力出版社,2002.
  • 4WARRENDER C,FORREST S,PEARLMUTT B.Detecting Instrusions Using Sytem Calls:Alternative Data Model[A].IEEE Symposium on Security and Privacy[C].1999.133~145.
  • 5PETERSENR 陶华敏译.Linux技术大全[M].北京:机械工业出版社,2002..
  • 6STANGERJ PATRICKTL 钟日红译.Linux黑客防范--开放源代码安全指南[M].北京:机械工业出版社,2002..
  • 7SKOUDISE 宁科译.反击黑客[M].北京:机械工业出版社,2002..

二级参考文献3

  • 1Porras P A, Valdes A. Live Traffic Analysis of TCP/IP Gateways. To Appear in Internet Society's Networks and Distributed Systems Security Symposium, 1998-03
  • 2Hen S S.Common Intrusion Detection Framework.http://seclab.cs. ucdavis edu/cidf/
  • 3Ptacek T P, Newsham T N. Secure Networks, Inc. Insertion, Evasion, and Denial of Service: Eluding Network intrusion Detection. http://www.snort.org/docs/idspaper/, 1998-01

共引文献9

同被引文献9

  • 1朱大立,陈晓苏.基于数字水印技术的电子政务安全模型[J].计算机应用,2005,25(B12):80-81. 被引量:12
  • 2刘亚杰,周学广.基于物理隔离技术数据安全转发的模型[J].计算机与数字工程,2006,34(11):164-166. 被引量:3
  • 3IT Policy Compliance Group. Why Compliance pays: reputations and revenues at risk [ EB/OL ]. http ://www. itpolicycompliance, com/, July 2007.
  • 4IT Policy Compliance Group. Taking action to protect sensitive data[EB/OL], http://www, itpolicycompliance. com/, March 2007.
  • 5http ://bbs. 51 cto. com/archiver/tid-113595, html.
  • 6http://pcedu, pconline, com. cn/soft/virus/safe/0803/ 1239247. html.
  • 7CHEUNG S C, CHIU D K W. A watermarking infrastructure for enterprise document management [ C ] //Proceedings of the 36th Annual Hawaii International Conference on System Sciences, 2003 : 105.2.
  • 8ANAN T, KURAKI K, NAKAGATA S. Watermarking technologies for security-enhanced printed documents, FUJITSU Scientific and Technical Journal, 2007,43 ( 2 ) : 197 - 203.
  • 9TOPKARA M, RICCARDI G, HAKKANI T D, ATALLAH M. Natural language watermarking: challenges in building a practical system [ C ]//Proceedings of the SPIE, International Conference on Security, Steganography, and Watermarking of Multimedia Contents VI, January, 2006, San Jose, CA.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部