期刊文献+

一个准确高效的基于程序行为的异常检测模型 被引量:1

Accurate Efficient Program Behavior-based Anomaly Detection Model
下载PDF
导出
摘要 提出一个高效准确的基于程序行为的异常入侵检测模型,该模型对于静态链接的程序部分以及函数递归基于优化的堆栈遍历技术获得调用堆栈状态信息;对于程序循环,使用代码插入和Null挤压技术来高效地获得系统调用上下文信息;基于动态通知技术,处理非标准的控制转移;从而,能够获得完备的系统调用上下文信息,提高了模型的准确度.给出了模型的描述和实施,分析了其优点.在Linux程序上的实验表明,该模型可保持检测的高效率. An accurate efficient program behavior-based anomaly detection model is proposed. For statically-linked program portion and function recursive, optimized call stack walk is adopted to gain call stack state information, code insertion and Null call squelching is used to deal with loop function. Dynamic notifying technique is used to deal with non-standard control transfer. Thereby, it can gain complete system call context information, which improve the model's precision. Formal description of the new model is given, its enforcement is detailed and its advantages are discussed. Performance evaluations on Linux programs show that the new model is efficient.
出处 《小型微型计算机系统》 CSCD 北大核心 2008年第11期2070-2073,共4页 Journal of Chinese Computer Systems
关键词 基于程序行为的异常检测 系统调用 CPDA模型 堆栈遍历 代码插入 program behavior-based anomaly detection CPDA model call stack walk code instrumentation
  • 相关文献

参考文献1

二级参考文献14

  • 1Hofmeyr S A,Somayaji A,Forrest S.Intrusion Detection System Using Sequences of System Calls[J].Journal of Computer Security,1998,6(3):151-180.
  • 2Warrender C,Forrest S,Pearlmutter B.Detecting Intrusions Using System Calls:Alternative Data Models[C].Proceedings of IEEE Symposium on Security and Privacy,1999:133-145.
  • 3Michael C C,Ghosh Anup.Two State-based Approaches to Program-Based Anomaly Detection[J].ACM Transactions on Information and System Security,2002,5(3).
  • 4Endler D.Intrusion Detection:Applying Machine Learning To Solaris Audit Data[C].Proceedings of the 1998 Annual Computer Security Applications Conference,1998.
  • 5Wagner D,Dean D.Intrusion Detection via Static Analysis[C].Proc.of IEEE Symposium on Security and Privacy,Oakland,California,2001-05.
  • 6Wespi A,Dacier M,Debar H.Intrusion Detection Using Variable-length Audit Trail Patterns[C].Proceedings of Recent Advance of Intrusion Detection,2000.
  • 7Marceau C.Characterizing the Behavior of A Program Using Multiple-length N-grams[C].Proceedings of the New Security Paradigm Workshop,2000-09:101-110.
  • 8Eskin E,Lee W.Modeling System Call for Intrusion Detection with Dynamic Windows Sizes[C].Proceedings of DISCEX Ⅱ,2001-06.
  • 9Sekar R,Bendre M,Dhurjati D,et al.A Fast Automaton-based Method for Detecting Anomalous Program Behaviors[C].Proc.of IEEE Symposium on Security and Privacy,2001.
  • 10Feng H,Kolesnikov O,Fogla P,et al.Anomaly Detection Using Call Stack Information[C].Proc.of IEEE Symposium on Security and Privacy,Oakland,California,2003-05.

同被引文献6

引证文献1

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部