期刊文献+

从程序执行流重构入侵模型的有效方法

Effective method for intrusion model reconstruction from execution-trace
下载PDF
导出
摘要 建立一种重构网络入侵模型的有效方法,依据入侵实例中所记录的入侵过程的消息流及受害软件实际执行的指令流,通过反编译并应用改进的形式分析及验证技术构建出充分一般的入侵模型。与目前绝大多数基于独立消息特征(signature)的入侵模型不同,该模型能精确给出恶意消息上下文之间的关联模式,表达出入侵过程的动态特征,效率可行并具有逻辑上可证明的精确性。在详细阐述方法的理论基础之后,也讨论了针对安全演化的应用。 This paper proposes an efficient method to reconstruct the general network intrusion model from transcripts and instruction traces recorded during the intrusion via decompilation, enhanced formal analysis and verification techniques.In contrast to most current works focused on exploit signature generation, this method precisely models context-sensitive relations among malicious messages to reflect the intrusion dynamics, which has practical efficiency and provable soundness.In addition to detailed theoretical analysis,the engineering evaluation and application are also briefly presented.
出处 《计算机工程与应用》 CSCD 北大核心 2011年第17期61-64,73,共5页 Computer Engineering and Applications
基金 国家自然科学基金No.60673046 大连理工大学跨学科建设基金(No.8234204)~~
关键词 网络入侵 模型重构 执行流 network intrusion model reconstruction execution traces
  • 相关文献

参考文献25

  • 1Szor P.The art of computer virus research and defense[M].[S.l.] :Symantec Cooperation Press,2006.
  • 2Northcutt S.Network intrusion detection:an analyst's handbook[M].[S.1.] :Addison-Wesley Inc,2003.
  • 3Gundy M,Bazarotti D,Vigna G.Evading network signatures with Web-based polymorphic attacks[C] //Proc WOOT,2007.
  • 4Sommer R,Paxon V.Enhancing byte-level network intrusion detection signatures with context[C] //Proc ACM CCS,2003.
  • 5Brumley D,Newsome J,Song D,et al.Towards automatic generation of vuinerability-based signatures[C] //Proc IEEE Symposium on Security and Privacy,2006.
  • 6Wang H J,Guo C,Simon D.Shield:vuinerability-driven network filters for preventing known vulnerability exploits[C] //Proc ACM SIGCOMM Conference,2004.
  • 7Brumley D,Wang H,Jha S,et al.Creating vulnerability signatures using weakest pre-conditions[C] //Proceedings of Computer Security Foundations Symposium,2007.
  • 8Newsome J,Brumley D,Franklin J,et al.Replayer:automatic protocol replay by binary analysis[C] //Proc ACM CCS' 06,Alexandria,Virginia,2006.
  • 9Yin H,Song D,Egele M,et al.Panorama:capturing system-wide information flow for malware detection and analysis[C] //Proceedings of ACM Conference on Computer and Communications Security(CCS),2007.
  • 10Nethercote N,Seward J.Valgrind:a program supervision framework[C] //Proceedings of 3rd Workshop on Runtime Verification (RV'03),Boulder Colorado,2003.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部