期刊文献+

基于资源可用性的主机异常检测 被引量:3

A Method for Host Abnormal Detection Based on Resource Availability
下载PDF
导出
摘要 主机的异常行为复杂多样,产生异常的原因有很多,但主机的异常行为往往体现在主机对CPU、内存、带宽等资源的使用状况上。基于此,该文提出主机资源可用性的概念,并围绕主机资源可用性建立了主机异常检测的新方法。首先,选择一组能够体现主机资源使用状况的指标,建立主机资源可用性测度指标体系,再通过实验分析,建立正常状况下主机资源可用性的轮廓特征,最后根据主机资源可用性的特殊性,利用双阈值异常检测算法检测主机的异常。经过实际测试,该方法具有很好的异常检测效果。 Abnormal behaviors of hosts are complicated and diversified caused by many factors. However, they are often incarnated by the usage of resouces such as CPU, memory, bandwidth, etc. In this paper, a novel method for anomaly detection based on Host Resource Availability (HRA) is presented. Firstly, an index system is established to describe the usage of host resource. Secondly, a normal profile of HRA is extracted by experiment. Finally, an algorithm called Double-Threshold Anomaly Detection Algorithm (DTADA ) is put forward according to the particularity of HRA. Application testing shows that our method has a satisfied result.
出处 《电子科技大学学报》 EI CAS CSCD 北大核心 2007年第S3期1449-1452,共4页 Journal of University of Electronic Science and Technology of China
基金 国家自然科学基金重点项目(60633020) 国家242信息安全计划(2006C26)
关键词 异常检测 双阈值 主机 资源可用性 anomaly detection double threshold host resource availability
  • 相关文献

参考文献9

二级参考文献48

  • 1卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:234
  • 2向尕,曹元大.一种面向检测的攻击分类方法及在IDS中的应用[J].计算机工程,2004,30(11):94-95. 被引量:3
  • 3冯力,管晓宏,郭三刚,高艳,刘培妮.采用规划识别理论预测系统调用序列中的入侵企图[J].计算机学报,2004,27(8):1083-1091. 被引量:11
  • 4H Burch,B Cheswick.Tracing Anonymous Packets to Their Approximate Source[C].In:Proc USENIX LISA'00 , New Orleans,USA,2000: 313-321.
  • 5J Black,S Halevi,H Krawczyk.UMAC:Fast and Secure Message Authentication[J].Lecture Notes in Computer Science, 1999; 1666:216-233.
  • 6Alex C Snoeren, Craig Partridge, Luis A.Sanche.Single-Packet IP Traceback[J].IEEE/ACM Transactions on Networking(ToN),2002;10: 1-2,4-7.
  • 7Steven Bellovin,Marcus Leech,Tom Taylor.ICMP Traceback Message the IETF ICMP Traceback[S].Internet Draft:draft-bellovin-itrace-00. txt, submitted 2000-03, expiration date, 2000-09: 1-4.
  • 8MICROSOFT CORPORATION.Stop OA in Tcpip.sys when receiving out of band (OOB)Data.http ://support.microsoft.com/default.aspx? scid=kb; en-us : 143478.
  • 9W. Lee, S. Stolfo, and P. Chan. Learning Patterns from Unix Process Execution Traces for Intrusion Detection.AAAI Workshop: AI Approaches to Fraud Detection and Risk Management, 1997.
  • 10Sun Microsystems, Inc., 901 San Antonio Road, Palo Alto,CA 94303, USA. SunSHIELD Basic Security Module Guide, Oct. 1998. Part No. 805-2635-10.

共引文献24

同被引文献8

引证文献3

二级引证文献46

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部