期刊文献+

基于数据取值规则的入侵检测技术

Intrusion Detection Based on Value Rule
下载PDF
导出
摘要 目前的入侵检测系统往往利用系统调用序列来设计,而忽略了系统调用序列所运行的数据环境,因此无法应对那些不改变系统调用序列的新型攻击.提出了一种新的入侵检测模型,它结合系统调用序列及其运行的数据环境来进行检测,通过学习系统调用序列的数据取值规则,增强模型的检测能力.实验结果表明,与现有模型相比,该方法具有检测效率高、误警率低及训练阶段时空开销小的优点. Now the intrusion detection models are usually designed in terms of system call sequence,but not their arguments.This kind of detection model can not effectively deal with new attacks which do not change the system call sequence.To address the problem,this paper supposes a new approach which combines the system calls with their temporal arguments.This approach can strengthen the ability of detection against some new attacks by learning the value-rule of the arguments between system calls.The experiment results illustrate that compared with existent intrusion detection models this approach is more effective,has lower positive warning rate and less time and space consuming within the training phrase.
出处 《微电子学与计算机》 CSCD 北大核心 2008年第11期125-128,共4页 Microelectronics & Computer
基金 国家自然科学基金项目(69873040)
关键词 系统调用 取值规则 异常入侵检测 system call value rule abnormal intrusion detection
  • 相关文献

参考文献6

  • 1Denning D E. An intrusion detection model [ J ]. IEEE Transactions on software Engineering, 1987, 13 ( 2 ) : 222 - 232.
  • 2Hofmeyr S, Forrest S, Sornayaji A. Intrusion detection using sequences of system calls[J]. Journal of Computer Security (JCS), 1998,6(3) : 151 - 180.
  • 3Ye Nong, Li Xiangyang, Chen Qiang, et al. Probabilistic techniques for intrusion detection based on computer audit data[J]. IEEE Transaction on System, 2001, 31(4) :267 - 274.
  • 4Kruegel C, Kirda E, Mutz D, et al. Automating mimicry attacks using static binary analysis[ C]//USENIX Security Symposium. Baltimore, MD, 2005.
  • 5Chen S, Xu J, Sezer E C, et al. Noncontrol- data attacks are realistic threats[ C]//USENIX Security Symposium. Baltimore, MD, 2005.
  • 6Sandeep Bhatkar, Abhishek Chaturvedi, Sekar R. Dataflow anomaly detection[ C]//2006 IEEE Symposium on Security and Privacy. USA, NY: Stong Brook University, 2006:48 - 62.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部