期刊文献+

Model for Software Behaviour Detection Based on Process Algebra and System Call 被引量:1

基于进程代数和系统调用的软件行为检测模型(英文)
下载PDF
导出
摘要 Behaviour detection models based on automata have been studied widely. By add- ing edge ε, the local automata are combined into global automata to describe and detect soft- ware behaviour. However, these methods in- troduce nondeterminacy, leading to models that are imprecise or inefficient. We present a model of software Behaviour Detection based on Process Algebra and system call (BDPA). In this model, a system call is mapped into an action, and a function is mapped into a process We construct a process expression for each function to describe its behaviour. Without con- strutting automata or introducing nondeter- minacy, we use algebraic properties and algo- rithms to obtain a global process expression by combining the process expressions derived from each function. Behaviour detection rules and methods based on BDPA are determined by equivalence theory. Experiments demon- strate that the BDPA model has better preci- sion and efficiency than traditional methods. Behaviour detection models based on automata have been studied widely.By adding edgeε,the local automata are combined into global automata to describe and detect software behaviour.However,these methods introduce nondeterminacy,leading to models that are imprecise or inefficient.We present a model of software Behaviour Detection based on Process Algebra and system call(BDPA).In this model,a system call is mapped into an action,and a function is mapped into a process.We construct a process expression for each function to describe its behaviour.Without constructing automata or introducing nondeterminacy,we use algebraic properties and algorithms to obtain a global process expression by combining the process expressions derived from each function.Behaviour detection rules and methods based on BDPA are determined by equivalence theory.Experiments demonstrate that the BDPA model has better precision and efficiency than traditional methods.
出处 《China Communications》 SCIE CSCD 2013年第11期24-36,共13页 中国通信(英文版)
基金 supported by the Fund of National Natural Science Project under Grant No.61272125 the Specialized Research Fund for the Doctoral Program of Higher Education under Grant No.20121333110014 the Hebei Provincial Natural Science Foundation under Grant No.F2011203234
关键词 intrusion detection software be-haviour model static analysis process algebra system call 检测模型 系统调用 检测软件 代数和 行为 进程 运算法则 代数性质
  • 相关文献

参考文献21

  • 1FORREST S, HOFMEYR S A, SOMAYAJI A, et al. A Sense of Self for Unix Processes[C]// Proceedings of 1996 IEEE Symposium on Security and Privacy: May 6-8, 1996. Oakland, CA, USA. IEEE Press, 1996: 120-128.
  • 2HOFMEYR S A, FORREST S, SOMAYAJI A. Intrusion Detection Using Sequences of System Calls[J]. Journal of Computer Security, 1998, 6(3): 151-180.
  • 3HELMAN P, BHANGOO J. A Statistically Based System for Prioritizing Information Exploration under Uncertainty[J]. IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans, 1997, 27(4): 449-466.
  • 4LEE W, STOLFO S J. Data Mining Approaches for Intrusion Detection[C]// Proceedings of the 7th USENIX Security Symposium: January 26- 29, 1998. San Antonio, TX, USA, 1998: 26-40.
  • 5LEE W, STOLFO S J, CHAN P K. Learning Patterns from U nix Process Execution Traces for Intrusion Detection[C]// Proceedings of the AAAI Workshop on AI Approaches to Fraud and Risk Management: July 27-28, 1997. Providence, Rhode Island, USA. AAAI Press, 1997: 50-56.
  • 6SEKAR R, BENDRE M, BOLLINENI P. et al. A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors[c]// Proceedings of 2001 IEEE Symposium on Security and Privacy (S&P 2001): May 14-16, 2001. Oakland, CA, USA. IEEE Press, 2001: 144-155.
  • 7WAGNER D, DEAN D. Intrusion Detection via Static Analysis[C]// Proceedings of 2001 IEEE Symposium on Security and Privacy (S&P 2001): May 14-16, 2001.0akland, CA, USA. IEEE Press, 2001: 156-168.
  • 8GIFFIN J, JHA S, MILLER B. Detecting Manipulated Remote Call Streams[C]// Proceedings of the 11th USENIX Security Symposium: August 8-12,2002. San Francisco, CA, USA, 2002: 61-79.
  • 9GIFFIN J, JHA S, MILLER B. Efficient ContextSensitive Intrusion Detection[C]// Proceedings of the 11th Network and Distributed System Security Symposium: February 5-6, 2004. San Diego, CA, USA, 2004.
  • 10GOPALAKRISHNA R, SPAFFORD E H, VITEK J. Efficient Intrusion Detection Using Automaton Inlining[C]// Proceedings of 2005 IEEE Symposium on Security and Privacy: May 8-11, 2005. Oakland, CA, USA. IEEE Press, 2005: 18-31.

二级参考文献71

  • 1朱维军,王忠勇,张海宾.Intrusion Detection Algorithm Based on Model Checking Interval Temporal Logic[J].China Communications,2011,8(3):66-72. 被引量:5
  • 2张燕,傅建明,孙晓梅.一种基于模型检查的入侵检测方法[J].武汉大学学报(理学版),2005,51(3):319-322. 被引量:4
  • 3苏璞睿,杨轶.基于可执行文件静态分析的入侵检测模型[J].计算机学报,2006,29(9):1572-1578. 被引量:14
  • 4Denning D. An intrusion detection model. IEEE Trans. on Software Engineering, 1987,13(2):222-232.
  • 5Forrest S. A sense of self for UNIX processes. In: Proc. of the IEEE Symp. on Security and Privacy. Oakland: IEEE Press, 1996. 120-128. http://www.cs.unm.edu/-forrest/publications/ieee-sp-96-unix.pdf
  • 6Hofmeyr SA, Forrest S, Somayaji A. Intrusion detection using sequences of system calls. Journal of Computer Security, 1998, 6(3):151-180.
  • 7Helman P, Bhangoo J. A statistically based system for prioritizing information exploration under uncertainty. IEEE Trans. on Systems, Man and Cybernetics, Part A: Systems and Humans, 1997,27(4):449466.
  • 8Lee W, Stolfo SJ. Data mining approaches for intrusion detection. In: Proc. of the 7th USENIX Security Syrup. San Antonio, 1998. 26-40. http://www.usenix.org/publications/library/proceedings/sec98/full_papers/lee/lee.pdf
  • 9Lee W, Stolfo SJ, Chan PK. Learning patterns from UNIX process execution traces for intrusion detection. In: AAAI Workshop on AI Approaches to Fraud Detection and Risk Management. AAAI Press, 1997. 50-56. http://www.cc.gatech.edu/-wenke/papers/ osid paper.ps
  • 10Sekar R, Bcndre M, Bollineni P, Dhurjati D. A fast Automaton-Based method for detecting anomalous program behaviors. In: IEEE Symp. on Security and Privacy. Oakland: IEEE Press, 2001. 144-155. http://www.cc.gatech.cdu/-wcnkc/ids-readings/automaton. pdf

共引文献48

同被引文献3

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部