期刊文献+

基于主机系统调用的入侵检测方法研究

RESEARCH THE METHODS TO DETECT INTRUSIONS USING SYSTEM CALL-BASED HOST
下载PDF
导出
摘要 大多数的入侵行为是由于一系列操作系统内部的非法或异常调用引起的,因此对系统调用序列进行分析是入侵检测的一个重要方法。给出了两种基于系统调用的序列分析方法:基于频繁统计和基于权值树的滑动窗口序列分析方法,并且描述了相应算法的主要过程。并通过试验证明了它们的合理性和有效性。 Sequence analysis to system call sequences is an important method in intrusion detection, for most of the system intrusions are conduced by illegimate or irregular system calls to operation system. This paper puts forward two methods for sequence analysis of sliding windows based on frequency counting and weight trees, and describes their principles and algorithms in detail. They are proved to be effective by the experiments in the public data sets.
出处 《计算机应用与软件》 CSCD 北大核心 2006年第11期19-21,45,共4页 Computer Applications and Software
基金 国家自然科学基金(No.60173014) 北京市自然科学基金(No.4022003)资助项目
关键词 入侵检测 系统调用序列 滑动窗口 Intrusion detection System call sequence Sliding window
  • 相关文献

参考文献4

  • 1Steven A. Hofmeyr, Stephanie Forrest, Anil Somayaji. Intrusion Detection Using Sequences of System Calls. Journal of Computer Security, 6 (3):151-180 (1998).
  • 2Christina Warrender. Stephaie Forrest. Barak Pearlmutter: Detecting Intrusions Using System Calls: Alternative Data Models. IEEE 133-145(1999).
  • 3W. Lee,S. J. Stolfo,and P. K. Chan. Learning patterns from unix process execution traces for intrusion detection. In AAAI Workshop:AI Approaches to Fraud Detection and Pisk Management, pp. 50-56. AAAI Press,July 1997.
  • 4潘峰,欧阳明光,汪为农.利用系统调用序列检测入侵的一种新方法[J].上海交通大学学报,2004,38(1):26-28. 被引量:8

二级参考文献5

  • 1[1]Axelsson S. Intrusion detection systems: A survey and taxonomy [EB/OL]. http: //citeseer. nj. nec.com/axelsson00intrusion. html, 2000.
  • 2[2]Forrest S, Hofmeyr S A, Somayaji A. A sense of self for unix process[A]. Proceedings of 1996 IEEE Symposium on Computer Security and Privacy [C].Oakland, California: IEEE Computer Society Press,1996. 120-128.
  • 3[3]Lee W, Stolfo S J, Chan P K. Learning patterns from unix process execution traces for intrusion detection[A]. Proceedings of AAAI97 Workshop on AI Methods in Fraud and Risk Management[C]. Menlo Park:CA, AAAI Press,1997.50-56.
  • 4[4]Warrender C, Forrest S, Pearlmutter B. Detecting intrusions using system calls :alternative data models [A]. Proceedings of 1999 IEEE Symposium on Security and Privacy[C]. Oakland California:IEEE Computer Society Press, 1999. 133- 145.
  • 5[5]Ghosh A K, Schwartzbard A, Shatz A M. Learning program behavior profiles for intrusion detection [A]. Proceedings of 1st USENIX Workshop on Intrusion Detection and Network Monitoring[C]. Santa Clara, CA :IEEE Computer Society Press, 1999.

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部