期刊文献+

基于满十六叉有序树的程序行为建模搜索方法

A Method for Program Behavior Modeling and Searching Based on Full 16-ary Ordered Trees
下载PDF
导出
摘要 程序行为建模及搜索是异常检测研究中的关键问题。本文提出利用系统调用发生时的程序计数器值对应的段号和段内偏移作为事件,将滑动窗口在有序事件上滑动得到事件序列集合,利用满十六叉有序树算法建立正常行为模型库。满十六叉有序树是为提高规则库的存储及搜索的效率而设计的,其存储的字节顺序隐含着结点间关系信息。在规则库中搜索某条规则的时间复杂度仅与树的深度有关,树的深度固定时的时间复杂度为O(1)。文中给出了满十六叉有序树的定义,分析了它的特点,并给出生成算法和搜索算法。 Program behavior modeling and searching is the key issue of anomaly detection. A method is presented, in which the segment ID and the offset of the program counter (PC), when system calls are invoked,are used as events. The event sequence set is produced by sliding the window in orderly events, and a normal behavior model set is built by using full 16-ary ordered trees. A full 16-ary ordered tree is designed for improving the efficiency of storing and searching rule sets. The storage byte sequence in the full 16-ary ordered tree implies the relationship information between nodes. The time complexity of searching the rule set for a rule only relates to the depth of the tree, and if the depth of the tree is fixed, the time complexity is OCD. The definition of a full 16-ary ordered tree, its features, its creating and searching algorithms are presented.
出处 《计算机工程与科学》 CSCD 2007年第6期4-6,54,共4页 Computer Engineering & Science
关键词 正常程序行为模型库 事件 满十六叉有序树 异常检测 normal program behavior model event full 16-ary ordered tree anomaly detection
  • 相关文献

参考文献9

  • 1Lhee K,Chapin S J.Buffer Overflow and Format String Overflow Vulnerabilities[J].Software-Practice & Experience,2003,33(5):423-460.
  • 2Cowan C,Beattie S,Johansen J,et al.PointGuard TM:Protecting Pointers from Buffer Overflow Vulnerabilities[A].Proc of the 12th Usenix Security Symp[C].2003.91-104.
  • 3Cowan C,Barringer M,Beattie S,et al.Formatguard:Automatic Protection from Printf Format String Vulnerabilities[A].Proc of the 10th USENIX Security Symp[C].2001.191-200.
  • 4Kc G S,Keromytis A D,Prevelakis V.Countering Code-Injection Attacks with Instruction-Set Randomization[A].Proc of the 10th ACM Conf on Computer and Communications Security[C].2003.272-280.
  • 5Vendicator.Stack Shield:A Stack Smashing Technique Protection Tool for Linux[EB/OL].http://www.angelfire.com/sk/stackshield/,2001-06.
  • 6Liang Z,Sekar R.Automatic Generation of Buffer Overflow Attack Signatures:An Approach Based on Program Behavior Models[A].Proc of the 21st Annual Computer Security Applications Conf[C].2005.10-19.
  • 7张衡,卞洪流,吴礼发,张毓森,崔明伟,曾庆凯.基于LSM的程序行为控制研究[J].软件学报,2005,16(6):1151-1158. 被引量:5
  • 8Feng H H,Kolesnikov O M,Fogla P,et al.Anomaly Detection Using Call Stack Information[A].Proc of the 2003 IEEE Symp on Security and Privacy[C].2003.62-77.
  • 9Xu J,Kalbarczyk Z,Iyer R K.Transparent Runtime Randomization for Security[A].Proc of the 22nd Int'l Symp on Reliable Distributed Systems[C].2003.260-269.

二级参考文献2

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部