期刊文献+

基于进程代数的并发行为检测模型 被引量:1

Model of Concurrent Behavior Detection Based on Process Algebra
下载PDF
导出
摘要 针对并发行为难以描述和检测的问题,引入进程代数对系统调用序列进行分析,提出一种描述和检测并发行为的模型。首先通过静态分析二进制码得到系统的控制流程图,并对流程图进行分析生成进程表达式;接着针对并发行为的互斥和同步关系重写表达式,向表达式中添加并发操作;然后通过扩展进程代数的性质和运算法则构造出动作、算子和进程3个基本元素,进而建立了模型;最后给出并发行为检测的方法并对模型的时空效率进行了分析和验证。理论分析和实验表明,所提出的方法具有线性的时间和空间复杂度。 By introducing process algebra to analyze system call sequences, a model of description and detection concurrent behavior was presented. Firstly, control flow graphs of system (CFGs) were generated by static binary code analysis. Secondly, by analyzing CFGs, process expressions were generated. Then according to synchronization and mutex of concurrent behaviors, process expressions were rewritten by adding concurrent operation. By extending algebraic properties and algorithms, three basic elements ( action, operator and process) were constructed. Finally, the CBDPA model was constructed and concurrent behavior detection methods were given. Ex- periments demonstrated that this method has linear space-time complexity.
出处 《四川大学学报(工程科学版)》 EI CAS CSCD 北大核心 2014年第1期35-40,共6页 Journal of Sichuan University (Engineering Science Edition)
基金 国家自然科学基金资助项目(61272125) 教育部高等学校博士学科点专项科研基金资助项目(20121333110014) 河北省自然科学基金资助项目(F2011203234)
关键词 入侵检测 并发行为 静态分析 进程代数 系统调用 intrusion detection concurrent behavior static analysis process algebra system call
  • 相关文献

参考文献13

  • 1Forrest S. A sense of self for UNIX processes[A].Oakland:IEEE Press,1996.120-128.
  • 2Wagner D,Dean D. Intrusion detection via static analysis[A].Oakland:IEEE Press,2001.156-168.
  • 3Giffin J,Jha S,Miller B. Efficient context-sensitive intrusion detection[A].San Diego:ISOC Press,2004.
  • 4李闻,戴英侠,连一峰,冯萍慧.基于混杂模型的上下文相关主机入侵检测系统[J].软件学报,2009,20(1):138-151. 被引量:31
  • 5傅建明,陶芬,王丹,张焕国.基于对象的软件行为模型[J].软件学报,2011,22(11):2716-2728. 被引量:20
  • 6Savage S,Burrows M,Nelson G. Eraser:A dynamic data race detector for multi-threaded programs[J].ACM Transactions on Computer Systems,1997,(04):391-411.
  • 7Schonberg E. On-the-fly detection of access anomalies[A].Portland:ACM Press,1991.285-297.
  • 8Wang L Q,Stoller S D. Runtime analysis of atomicity for multi-threaded programs[J].IEEE Transactions on Software Engineering,2006,(02):93-110.
  • 9孔德光,谭小彬,奚宏生,帅建梅,宫涛.多线程程序时序分析的隐Markov模型[J].软件学报,2010,21(3):461-472. 被引量:7
  • 10Bekic H. Towards a mathematical theory of processes[R].Vienna:IBM Laboratory,Technical Report TR 25 125,1971.

二级参考文献21

  • 1吴萍,陈意云,张健.多线程程序数据竞争的静态检测[J].计算机研究与发展,2006,43(2):329-335. 被引量:21
  • 2苏璞睿,杨轶.基于可执行文件静态分析的入侵检测模型[J].计算机学报,2006,29(9):1572-1578. 被引量:14
  • 3Denning D. An intrusion detection model. IEEE Trans. on Software Engineering, 1987,13(2):222-232.
  • 4Forrest S. A sense of self for UNIX processes. In: Proc. of the IEEE Symp. on Security and Privacy. Oakland: IEEE Press, 1996. 120-128. http://www.cs.unm.edu/-forrest/publications/ieee-sp-96-unix.pdf
  • 5Hofmeyr SA, Forrest S, Somayaji A. Intrusion detection using sequences of system calls. Journal of Computer Security, 1998, 6(3):151-180.
  • 6Helman P, Bhangoo J. A statistically based system for prioritizing information exploration under uncertainty. IEEE Trans. on Systems, Man and Cybernetics, Part A: Systems and Humans, 1997,27(4):449466.
  • 7Lee W, Stolfo SJ. Data mining approaches for intrusion detection. In: Proc. of the 7th USENIX Security Syrup. San Antonio, 1998. 26-40. http://www.usenix.org/publications/library/proceedings/sec98/full_papers/lee/lee.pdf
  • 8Lee W, Stolfo SJ, Chan PK. Learning patterns from UNIX process execution traces for intrusion detection. In: AAAI Workshop on AI Approaches to Fraud Detection and Risk Management. AAAI Press, 1997. 50-56. http://www.cc.gatech.edu/-wenke/papers/ osid paper.ps
  • 9Sekar R, Bcndre M, Bollineni P, Dhurjati D. A fast Automaton-Based method for detecting anomalous program behaviors. In: IEEE Symp. on Security and Privacy. Oakland: IEEE Press, 2001. 144-155. http://www.cc.gatech.cdu/-wcnkc/ids-readings/automaton. pdf
  • 10Feng HH, Kolesnikov OM, Fogla P, Lee W, Gong W. Anomaly detection using call stack information. In: Proc. of the 2003 IEEE Syrup. on Security and Privacy. Oakland: IEEE Press, 2003.62-75. http://www-unix.ecs.umass.edu/-gong/papers/ok_idpc.pdf

共引文献49

同被引文献7

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部