期刊文献+

基于程序合法作用域的入侵检测系统的研究

Intrusion detection based on program’s legal function area
下载PDF
导出
摘要 通过分析应用程序在执行时的系统调用序列,提出了一种新的基于程序合法作用域的入侵检测方法。合法作用域的建立以程序的系统调用信息为依据,并采用了有限状态自动机对其进行建模,每一个合法作用域由一个状态来表示,它包含程序运行时的有效用户标示和有效组标示,然后据此检测系统的异常行为。实验结果表明,该方法可以检测到利用应用程序代码漏洞而发起的攻击,并且有较低的错误警报率。 By analyzing the system calls of a running process,a new intrusion detection method based on application’s "Legal Function Area"is proposed.The " Legal Function Area" is established by analyzing the system call information,and it is modeled by using finite-state machine,and every " Legal Function Area " is represented by one state which includes the euid and egid of the running process.A preliminary experiment shows that the new method can detect various attacks towards code vulnerabilities,and has a low false positive.
出处 《计算机工程与设计》 CSCD 北大核心 2010年第13期2966-2968,2975,共4页 Computer Engineering and Design
关键词 入侵检测 合法作用域 有限状态自动机 有效用户标示 有效组标示 intrusion detection legal function area finite-state machine effective user id effective group id
  • 相关文献

参考文献8

  • 1Forrest S,Hofmeyr S A,Somayaji A,et al.A sense of self for unix processes[J].IEEE Symposium on Computer Security and Privacy,1996(1):120-128.
  • 2Feng H H,Kolesnikov O M,Fogla P,et al.Anomaly detection using call stack information[C].Proceedings of the IEEE Symposium on Security and Privacy,2003.
  • 3Lorenzo Martignoni,Elizabeth Stinson.A layered architecture for detecting malicious behaviors[J].Recent Advances in Intrusion Dctection,2008,5230:78-97.
  • 4Danilo Bruschi,Lorenzo Cavallaro,Andrea Lanzi.Static analysis on x86 executables for preventing automatic mimicry attacks[J].Detection of Intrusions and Malware and Vulnerability Assessment,2007,4579:213-230.
  • 5Alessandro Frossi,Federico Maggi,Gian Luigi Rizzo,et al.Selecting and improving system call models for anomaly detection[J].Detection of Intrusions and Malware and Vulnerability Assessment,2009,5587:206-223.
  • 6Ilgun K,Kemmerer R A.State transition analysis:a rule-based intrusion detection approach[J].IEEE Transactions on Software Engineering,1995,21:181-199.
  • 7David Wagner,Paolo Sow.Mimicry attacks on host-based intrusion detection systems[C].Proceedings of the 9th ACM Conference on Computer and Communications Security,2002:255-264.
  • 81998-1999 DARPA intrusion detection evalnation[OL] ,http://www.ll.mit.edu/mission/communications/ist/corpora/ideval/index.html,Lincoln Laboratory.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部