期刊文献+

基于系统调用序列的状态转换检测新方法

The new method of the state-transition detection based on sequences of system calls
下载PDF
导出
摘要 以系统调用序列为对象提出一种新的状态转换检测方法,它结合历史系统调用序列和当前系统调用进行分析,提取直接和间接转换,并采用多元统计方法为转换加入参数,累计异常度.测试表明该模型有较高检测率和可操作性,比原方法更能有效得检测出未知类型入侵. A new method of the state-transition detection is presented, whose audit datum are form the sequences of system calls. It combines the past sequences of system calls and the present system call to analyze the relativities. The states transform on the condition of the direct or indirect relations. We use a multivariate statistical arithmetic to calculate parameters, which are accumulated as the degree of abnormity in the transition. Comparing with the original ,the result of tests shows that this method detects the unknown intrusions more effectively.
作者 李凌楠 岳兵
出处 《天津理工大学学报》 2006年第1期9-12,共4页 Journal of Tianjin University of Technology
基金 国家"863"项目基金(2002AA142010)
关键词 入侵检测 系统调用 状态转换 多元统计分析 intrusion detection system call state transition multivariate statistical analysis
  • 相关文献

参考文献7

  • 1[1]HOFMEYR S A,FORREST S,SOMAYAJI A.Intrusion detection using sequences of system calls [J].Journal of Computer Security,1998,6:151-180.
  • 2[2]DEBAR H,FIXED VS.Variable-length patterns for detecting suspicious process behavior:A [C].Belgium:SpringerVerlag,1998.1-15.
  • 3姚立红,訾小超,黄皓,茅兵,谢立.基于系统调用特征的入侵检测研究[J].电子学报,2003,31(8):1134-1137. 被引量:17
  • 4[4]KORAL LLGUM,RCHARD A.KEMMERER,et al.Porras.state transition analysis:A rule-based intrusion detection approach [J].IEEE Transaction on Software Engineering,1995,21(3):181-199.
  • 5[5]YE Nong,CHEN Qiang,SEAN VILBERT.Multivariate statistical analysis of audit trails for host-based intrusion detection [J].IEEE Transactions on Computers,2002,51(7):810-820.
  • 6[6]JOHNSON R A,WICHERN D W.Applied multivariate statistical analysis [M].NJ:Prentice Hall,1998.
  • 7徐明,陈纯,应晶.基于系统调用分类的异常检测(英文)[J].软件学报,2004,15(3):391-403. 被引量:27

二级参考文献30

  • 1S Forrest, et al. A sense af seaf for unix processes[A]. John McHugh IEEE Symposium on Security and Privacy, Proceedings[C]. Oakland CA:IEEE Computer Society Press, 1996.120 - 128.
  • 2A P Kosoresow, S A Hofmey. Intrusion detection via system call traces[J]. IEEE Software, 1997,14(5) :35 - 42.
  • 3W Lee, et al. Learning patteans from UNIX process execution traces forintrusion detection [A ]. AAAI Wodtshop on AI Approaches to Fraud Detection and Risk Management [C ]. Rhode laland: AAAI Press,1997.50 - 56.
  • 4M Asaka, et al. A new intrusion detection method based on discriminant analysis [J]. IEICE Tram. on Information & Systems, 2001, E-84-B(5) :570 - 577.
  • 5Yihua Liao, V Rao Vemuri. Using text categorization techniques for intrusion detection [ A ]. 11th USENIX Security Symposium [ C ]. San.Francisco, 2002.
  • 6H Debar, et al. Fixed vs. Variable-length pattexns for detecting suspicious process behavior [A] .5th European Symposium on Research in Computer Security [ C ]. Belgium: Springer-Verlag, 1998.1 - 15.
  • 7C Michael, A Ghosh. Two state-based approaches to program-based anomaly detection [DB/OL]. www. acsac, org/2000/parpers/96. pdf.
  • 8R Sekar, et al. A fast automaton-tin.seal method for detecting anomalous program behaviors [ A]. Roger Needham,IEEE Symposium on Securityand Privacy [C]. California: IEEK Computer Society Press,2001. 144- 155.
  • 9Aho A V, M J Corasick. Efficient suing matching: an aid to bibliographic search [J] .Communications of the ACM, 1975:333 - 340.
  • 10http://www.cs. unm. edu/- immsec/data [OL].

共引文献41

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部