期刊文献+

基于密码隔离的恶意代码免疫模型 被引量:3

A Crypto-based Immunization Model against Malicious Code
下载PDF
导出
摘要 基于访问控制的恶意代码防御模型对恶意代码实行的是逻辑隔离,它可能被旁路且防御效果受限于访问控制策略的有效性。本文基于密码学原理建立了一个恶意代码免疫模型,以克服逻辑隔离的脆弱性;定义了代码植入规则、保护规则和执行规则,实现代码存储和执行的安全;证明了在系统初态安全且代码加、解密密钥安全的条件下,任何时刻恶意代码都不会被执行和传播。 Access control based malicious code defending model has vulnerabilities because it may be circumvented in certain circumstances. In addition, its effectiveness depends on that of the access control policy applied. A crypto-based security model against malicious code is proposed which defined secure operation rules for executable code planting, protection, and execution. It is proved that if the initial system state is secure and the crypto keys for code protection are secure also, the proposed model will be able to protect system from being infected and be able to prevent subjects from invoking malicious codes, thus to stop malicious code from spreading.
出处 《计算机科学》 CSCD 北大核心 2008年第1期288-289,293,共3页 Computer Science
基金 国家“八六三”高技术研究发展计划项目(2002AA144020)的资助
关键词 安全模型 恶意代码 安全操作系统 Security model, Malicious code defending, Secure operating system
  • 相关文献

参考文献5

  • 1Cohen F. Computer Viruses: Theory and Experiments. Computers and Security, 1987, 6(1): 22-35.
  • 2Biba K J. Integrity Considerations for Secure Computer Systems. NTIS AD-A039324, Electronic Systems Division, Air Force Systems Command, April 1977.
  • 3杨涛.SUNIX安全操作系统:[学位论文].长沙:国防科技大学,1993.
  • 4Department of Defense of USA. Trusted Computer System Evaluation Criteria. DoD 5200. 28 - STD, Aug 1983.
  • 5Schneier B应用密码学-协议,算法与C源程序.北京:机械工业出版社,2000.

同被引文献35

  • 1鲍欣龙,马建辉,罗文坚,曹先彬,王煦法.用于未知病毒检测的免疫识别模型和算法研究[J].计算机科学,2005,32(1):74-76. 被引量:1
  • 2李涛.基于免疫的网络监控模型[J].计算机学报,2006,29(9):1515-1522. 被引量:53
  • 3龚涛,蔡自兴,罗一丹.基于免疫计算的抗蠕虫病毒Web系统[J].计算机工程与应用,2007,43(21):118-120. 被引量:1
  • 4Feng Gu,Julie Greensmith,Uwe Aickelin.Theoretical formulation and analysis of the deterministic dendritic cell algorithm[J]. BioSystems . 2013 (2)
  • 5Jieqiong Zheng,Yunfang Chen,Wei Zhang.A Survey of artificial immune applications[J]. Artificial Intelligence Review . 2010 (1)
  • 6E. H. J. G. Aarntzen,C. G. Figdor,G. J. Adema,C. J. A. Punt,I. J. M. Vries.Dendritic cell vaccination and immune monitoring[J]. Cancer Immunology, Immunotherapy . 2008 (10)
  • 7Jungwon Kim,Peter J. Bentley,Uwe Aickelin,Julie Greensmith,Gianni Tedesco,Jamie Twycross.Immune system approaches to intrusion detection – a review[J]. Natural Computing . 2007 (4)
  • 8Aickelin U,Bentley P,Cayzer S,Kim J,McLeod J.Danger theory: The link between ais and ids. The Second International Conference on Artificial Immune Systems (ICARIS-03) . 2003
  • 9Osamu Takeuchi,Shizuo Akira.Innate immunity to virus infection. Immunological Reviews . 2009
  • 10Dasgupta,Dipankar.Advances in artificial immune systems. IEEE Computational Intelligence Magazine . 2006

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部