期刊文献+

基于行为策略的主动防御系统设计 被引量:1

The design of the active defense system based on behavior strategy
下载PDF
导出
摘要 针对特征码扫描方法的不足,提出了一种基于程序的行为授权委托模型来判断执行程序是否为恶意代码的方法,对进程的权限进行控制,对程序的行为和系统的关键资源进行监控、自动分析、自动诊断,建立了一套较为完善的入侵自动检测报警机制,为权限控制增加了主动防御功能。试验结果表明,本方法有利于进一步加强管理信息系统的安全。 Considering the deficiency of scanning features,we propose a program-based behavior authorization model for the monitoring,auto analysis and diagnosis of the key resources of the computer program and system.Thus we set up an automatic intrusion detection alarm system which enables the access control better defense.Our experiment indicates that the method demonstrated in this paper is proved to be benefitial the safety of the management of information system.
出处 《佛山科学技术学院学报(自然科学版)》 CAS 2011年第4期38-43,共6页 Journal of Foshan University(Natural Science Edition)
基金 广东省自然科学基金资助项目(10152800001000016 9151040701000002)
关键词 主动防御 行为策略 特征码扫描法 权限控制 active defense behavior strategy scanning features access control
  • 相关文献

参考文献4

二级参考文献23

  • 1Lawrence A Gordon,Martin P Loeb.2004 CSI/FBI Computer Crime and Security Survey[EB/OL].http://www.gocsi.com/,2005-06.
  • 2Nikolai Joukov.Internet Worms as Internet-Wide Threat[EB/OL].http://www.ecsl.cs.sunysb.edu/tech_reports.html,2005-06.
  • 3Ferdinand Gomes.Internet Security Threat Report:Malicious Code Trends[EB/OL].http://enterprisesecurity.symantec.com/con-tent.cfm?articleid=1539,2005-06.
  • 4Munir Kotadia.Stealth Virus Warning Sounded Again[EB/OL].http://news.zdnet.co.uk/internet/0,39020369,39199961,00.htm,2005-06.
  • 5Daniel Wolff.BOTs and Packers:The New Polymorphism[C].APWG North American Spring Meeting,2005.6-15.
  • 6David M Chess,Steve R White.An Undetectable Computer Virus[C].Proceedings of Virus Bulletin Conference,2000.2-5.
  • 7Stephen Northcutt.Inside Network Perimeter Security[M].US:New Riders Publishing,2003.531-548.
  • 8Abhay Joshi.How to Protect Your Company From "Zero-day" Exploits[EB/OL].http://www.computerworld.com/printthis/2004/0,4814,90447,00.html,2005-06.
  • 9John V Harrison.Enhancing Network Security by Preventing User-Initiated Malware Execution[C].Proc.of the International Conference on Information Technology:Coding and Computing,2005.3-6.
  • 10Ryan Permeh.The Use of Application Specific Security Measures in a Modern Computing Environment[EB/OL].http://www.eeye.com/html/Research/Papers/DS20010322.html,2005-06.

共引文献8

同被引文献1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部