期刊文献+

涉密计算机监控与审计系统的设计与实现 被引量:10

Design and Implementation of Confidential Computer Monitor & Audit System
下载PDF
导出
摘要 针对涉密计算机的泄密途径,综合运用Windows平台下过滤驱动技术、SPI技术、拦截广播消息技术、虚拟打印机技术和Hook技术,设计并实现了一种计算机监控与审计系统,介绍了各模块的设计思想和算法。实验测试和实践证明该系统能较好地满足涉密计算机信息的保密要求。 Against the leakiness means of confidential computer, a confidential computer monitor and audit system is established, by using the technology of driver filter, SPI, message broadcast interrupt, virtual printing monitor and hook on Windows plattbrm, key algorithms and implementation methods of this system are focused. Experimental result and practice validate the availability of this system.
出处 《计算机工程》 CAS CSCD 北大核心 2008年第6期276-278,280,共4页 Computer Engineering
基金 江苏省高技术研究计划基金资助项目“计算机网络分布式主动防御、监控与预警技术研究”(BG2004030)
关键词 监控 审计 过滤驱动 SPI技术 虚拟打印机 monitor audit driver filter SPI: virtual printer
  • 相关文献

参考文献10

  • 1Gollmann D Computer Security[M].北京:人民邮电出版社,2003.
  • 2李培修,敖勇,贾永强.内网涉密信息泄露途径及防范[J].计算机安全,2005(7):75-76. 被引量:13
  • 3高岩,蒋若江.主机防护系统中系统调用截获机制的实现[J].计算机工程与设计,2003,24(11):76-80. 被引量:15
  • 4Cant C.Windows WDM设备驱动程序开发指南[M].孙义,译.北京:机械工业出版社,2000.
  • 5Baker A.Lozatlo J Windows 2000设备驱动程序指南[M].施诺,译.北京:机械工业出版社,2001.
  • 6朱雁辉.Windows防火墙与网络封包机制[M].北京:电子工业出版社,2002.
  • 7Microsoft Corporation. MSDN[DB/OL]. (2003-04-07). http://www. microsoft.com/msdn/.
  • 8C++Builder 研究.虚拟打印机源码 v l.O Full Source[DB/OL].(2006-07-13). http://www.ccrun.com/view.asp?id=201.
  • 9Richter J. Programming Applications for Microsoft Windows[M]. [S. l.]: Microsoft Press, 2000.
  • 10Microsoft TechNet. Regmonitro[DB/OL]. (2006-01-30). http:// search.technet.microsoft.com/search/default.aspx?siteld= 1 &tab=0 &query=regmonitor.

二级参考文献10

  • 1Prasad Dabak, Sandeep Phadke, Milind Borate. Undocumented windows NT[M]. John Wiley & Sons, 1999.
  • 2David A Solomon, Mark E Russinovich. Inside microsoft Windows 2000,Third edition[M]. Microsoft Press, 2000.
  • 3Gary Nebbet. Windows NT/2000 native API reference[M].Que. 1 st edition, 2000.
  • 4Dmitri Leman.Tracing NT kemel-mode calls[EB/OL], WDJ,2000, (4). http://www.wdj.com/articles/2000/00E04/0004b/0004b.htm? topic=articles.
  • 5Mark Russinovich, Bryce Cogswell. Windows NT systemcall hooking[J]. Dobbs Journal, 1997,(1).
  • 6James Finnegan. Windows NT process monitoring[D]. MS J,1999.
  • 7Galen Hunt, Doug Brubacher. Detours: Binary Interception of Win32 functions [C]. Proceedings of the 3rd USENIX Windows NT Symposium. Seattle, WA, 1999.
  • 8Yona Hollander, Romain Agostini. Stop hacker attacks at theOS level [EB/OL], Intemet Security Advisor Magazine,2000, (9/10). http://www.entercept.com/products/entercept/news/intsecadvmag.pdf.
  • 9Sekar R, Bowen T, Segal M. On preventing intrusions by process behavior monitoring [C]. Usenix Intrusion Detection Workshop, 1999.
  • 10Prasad Dabak, Milind Borate, Sandeep Phadke. Hooking windows nt system services[M]. M&T Books, 1999.

共引文献34

同被引文献52

引证文献10

二级引证文献47

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部