期刊文献+

基于Windows NativeAPI序列的系统行为入侵检测 被引量:2

Host intrusion detection based on sequence of Windows Native API
下载PDF
导出
摘要 针对Windows系统入侵检测的不足,研究并借鉴Linux下基于系统调用序列进行入侵检测的方法,提出一种采用BP神经网络算法对Windows Native API序列学习和分类的内核级主机入侵检测方案。通过实验,验证了采用Windows Native API序列进行系统入侵的可行性。Native API是Windows系统内核模式下的API,可以类比于Linux下的系统调用。通过训练神经网络学习Native API序列,建立一个对正常和异常Native API序列进行分类的BP神经网络。在入侵检测时,利用训练后的神经网络对不断出现的Windows Native API序列进行分类,判断系统是否出现异常入侵。 Considering the shortcomings of Windows system intrusion detection and the advantages of the Linux system intrusion detection based on the sequence of the system call,a kernel-level host intrusion detection program based on the BP neural network algorithm to study and classify the sequence of Windows Native API is proposed in this paper.Experiment results prove that the sequence of Native API can be used for intrusion detection.Windows Native API means the kernel model API,which is simi lar to the Linux system call.The neural network is trained to learn the normal and abnormal sequence of Native API.In the intrusion detection,use the trained neural network to classify the emerging Native API sequence,and find whether the intrusion happens.
出处 《计算机工程与应用》 CSCD 北大核心 2008年第18期109-112,共4页 Computer Engineering and Applications
基金 国家自然科学基金(the National Natural Science Foundation of China under Grant No.60702071) 国家教育部新世纪人才支持计划(the New Century Excellent Talent Foundation from MOE of China under Grant No.NCET- 06- 0811) 四川省科技厅应用基础研究基金(No. 2006J13~065)
关键词 入侵检测 WINDOWS NATIVE API BP神经网络 intrusion detection Windows Native API BP neural network
  • 相关文献

参考文献13

  • 1Lee W,Stolfo S J.Data mining approaches for intrusion detection[C]// Proc of the 7th USENIX Security Symp.Sam Antonio:USENIX, 1998:6-9.
  • 2Ye N.A Markov chains model of temporal behavior for anomaly detection[C]//Proc of the 2000 IEEE Workshop on Information Assurance and Security .United States Military Academy ,West Point: IEEE Press,2000: 171-174.
  • 3Battistoni R,Cabrielli E,Mancini L V.A host intrusion prevention system for Windows operating systems[C]//9th European Symposium Research in Computer Security,Sophia Antipolice France, 2004: 134-142.
  • 4Forrest S,Hofmeyr S A,Somayaji A,et al.A sense of self for UNIX processes[C]//Proceedings of the 1996 IEEE Symposium on Security and Privacy,6-8 May 1996: 120-128.
  • 5Lane T.Hidden Markov models for human/computer interface modeling[C]//Proc of the International AI Society.Proc of the 1JCAI-99 Workshop on Learning about Users.Stockholm:International AI Society, 1999: 35-44.
  • 6Han S J,Cho S B..Evolutionary neural networks for anomaly detection based on the behavior of a program[J].IEEE Transactions on Systems, Man., and Cybernetics-Part B : Cybernetics,2006,36 ( 3 ) : 559-570.
  • 7Michael C,Ghosh A.Simple,state-based approaches to program- based anomaly detection[J].ACM Transactions on Information and System Security, 2002,5(3 ) : 203-237.
  • 8Sekar R,Bendre M,Dhurjati D,et al.A fast automaton-based method for detecting anomalous program behaviors[C]//IEEE Computer Society.Oakland:IEEE,2000: 144,155.
  • 9Nebbett G.Windows NT/2000 Native API Reference[M].[S.l.]:Macmillan Technical Publishing( MTP ), 2000-02-15.
  • 10Zhang C L,Jiang J,Mohamed K.lntrusion detection using hierarchical neural networks[J].Pattern Recognition Letters, 2005,26( 6 ) : 779-791.

二级参考文献5

共引文献102

同被引文献26

  • 1彭宏.基于粗糙集理论的入侵检测方法研究[J].电子科技大学学报,2006,35(1):108-110. 被引量:13
  • 2张坤,朱扬勇.无重复投影数据库扫描的序列模式挖掘算法[J].计算机研究与发展,2007,44(1):126-132. 被引量:17
  • 3李永忠,徐静,赵博,杨鸽.基于变长系统调用序列模式的入侵检测方法研究[J].江苏科技大学学报(自然科学版),2007,21(3):36-41. 被引量:2
  • 4王硕,周激流,彭博.基于API序列分析和支持向量机的未知病毒检测[J].计算机应用,2007,27(8):1942-1943. 被引量:21
  • 5Nebbett G.Windows NT/2000 Native API reference[M].[S.l.] :Macmillan Technical Publishing(MTP),2000.
  • 6Warrender C,Forrest S,Pearlmutter B.Detecting intrusions using system calls:Alternative data models[C] //Proceedings of IEEE Symposium on Security and Privacy.Washington DC:IEEE Computer Society,1999:133-145.
  • 7Sree L P,Reddy N M,Rao M S.Host intrusion prevention system using signature file method[C] //2009 IEEE International Advance Computing Conference,2009:615-619.
  • 8Forrcst S,Hofineyr S A,Somayaji A,et al.A sense of self for UNIX processes[C] //Proceedings of IEEE Symposium on Security and Privacy.Washington DC:IEEE Computer Society,1996:120-128.
  • 9Li Yong-zhong,Zhao Bo,Xu Jing,et al.Anomaly intrusion dctection method based on rough set theory[C] //Proceedings of the 2008 International Conferance on Wavelet Analysis and Pattern Recognition,2008:764-770.
  • 10Zhang Chun-lin,Jiang Ju,Mohamed K.Intrusion detection using hierarchical neural networks[J].Pattern Recognition Letters,2005,26(6):779-791.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部