期刊文献+

Linux进程语义安全性检测的稳定模型

Stable Model of Semantics_based Security Detection for Linux Process
下载PDF
导出
摘要 现有进程检测方法,检测的目标是系统调用的序列的排列关联,忽略了语义中潜在的异常。稳定模型是逻辑程序的语义模型,可以用以发现并修改逻辑程序的异常问题。该文以系统调用为基本检测点,采用逻辑程序描述进程的基本语义逻辑,用稳定模型表达进程的检测语义。系统定义进程的一系列安全语义规则,在进程执行中,计算安全语义规则与进程逻辑之间的稳定模型,得到安全语义的可计算性结论。论文最后,给出了一个Linux系统中的进程语义安全性检测的基本框架。 At present,identifying patterns from system call trails are the primary method of process detection,and it neglects latent anomaly in semantics.As the semantics model of logic program,stable model can be used to find and modify the anomaly of logic program.This paper indicates the basic semantics logic of the process with logic program by detecting the system call.Then,the paper introduces a method to define the security semantics rules of the process,and get the conclusion of security semantics through calculating the stable model of security semantics rules and the process logic.At the end,a basic frame for semantics_based security detection based on Linux process is introduced in this paper.
出处 《计算机工程与应用》 CSCD 北大核心 2005年第10期15-18,共4页 Computer Engineering and Applications
基金 国家自然科学重大研究计划项目(编号:90204011) 软件工程国家重点实验室第五批开放基金支持课题
关键词 信息安全 稳定模型 进程检测 系统调用 information security,stable model semantics,process detection,system call
  • 相关文献

参考文献7

二级参考文献20

  • 1[1]Lindqvist U, Porras P A. Detecting Computer and Network Misuse Through the Production-based Expert System Toolset (P-BEST). In: Proceedings of the 1999 IEEE Symposium on Security and Privacy.Orkland California, 1999:146-161
  • 2[2]Hochberg J,Jackson K,Stallings C,et al.NADIR:An Automated System for Detection Network Intrusion and Misuse. Computer & Security, 1993,12(3): 235-248
  • 3[3]Smaha S E.Haystack:An Intrusion Detection System. In:Proceedings ofthe IEEE Fourth Aerospace Computer Security Applications Confe rence,Orlando,FL, USA,IEEE Computer Society Press, 1988:37-44
  • 4[4]Sebring M M,Shellhouse E,Hanna M E,et al. Expert Systems in Intrusion Detection:A Case Study. In Proceedings of the 1 lth National Computer Security Conference,Baltimore,Maryland,US A,NIST, 1988
  • 5[5]Lunt T F,Tamaru A,Gilham F,et aI.IDES:A Progress Report. In:Annual Computer Security Applications Conference,Tuscon,Arizona:IEEE Computer Society Press, 1990:273-285
  • 6[6]Forrest S,Hofmeyr S A,Somaya ii A,et al.A Sense of Self for Unix Processes.In:Proceedings of the 1996 IEEE Symposium on Security and Privacy,Orkland California, 1996:120-128
  • 7S Forrest, et al. A sense af seaf for unix processes[A]. John McHugh IEEE Symposium on Security and Privacy, Proceedings[C]. Oakland CA:IEEE Computer Society Press, 1996.120 - 128.
  • 8A P Kosoresow, S A Hofmey. Intrusion detection via system call traces[J]. IEEE Software, 1997,14(5) :35 - 42.
  • 9W Lee, et al. Learning patteans from UNIX process execution traces forintrusion detection [A ]. AAAI Wodtshop on AI Approaches to Fraud Detection and Risk Management [C ]. Rhode laland: AAAI Press,1997.50 - 56.
  • 10M Asaka, et al. A new intrusion detection method based on discriminant analysis [J]. IEICE Tram. on Information & Systems, 2001, E-84-B(5) :570 - 577.

共引文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部