期刊文献+

系统级入侵检测技术研究 被引量:1

Study on System—level Intrusion Detection Technology
下载PDF
导出
摘要 计算机系统安全的“免疫系统”方法是在研究了特权程序对应的系统调用短序列具有很强的稳定性的基础上提出的。系统调用短序列与生理免疫系统中用于区别病菌和其他有害物质的缩氨酸(一种蛋白质片断)类似,可作为用户程序行为模式。该文提出了一个基于“免疫系统”方法的Linux系统级入侵检测模型,并讨论了此入侵检测模型的实现技术。 The'Immune System'method for computer syst em security is based on the fact that the short sequences of system calls in runni ng processes are consistent.The short system calls are similar to the peptides used to distinguish the dangerous pathogens and other foreign materials from the harmless molecules normally within the body.The short system calls can be used to construct the database of normal behavior patterns for the processes.T his paper proposes a system-level intrusion detection system model,and discussed t he technologies of the system realization.
作者 贾春福
出处 《计算机工程与应用》 CSCD 北大核心 2002年第13期24-25,41,共3页 Computer Engineering and Applications
基金 天津市自然科学基金重点项目(编号:013600711)
关键词 系统级入侵检测 计算机网络 网络安全 防火墙 “免疫系统”方法 Immune System'method,I ntrusion detection,Short system call sequence,Normal and abnormal behavior pat tern
  • 相关文献

参考文献2

二级参考文献3

  • 1[1]David A.Curry. Improving the Security of Your Unix System. SRI International Publication,ITSTD-721-FR-90-21.April 1990.
  • 2[2]Alessandro Rubini Linux Device Driver,1st Edition February 1998 ISBN 1-56592-292-1.
  • 3[3]Linux Kernel Module Programming Guide version1.1 Ori Pomerantz ,LDP Document

共引文献3

同被引文献32

  • 1卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:232
  • 2曹元大,徐漫江.一种基于系统调用分析的入侵检测方法及其应用[J].计算机工程,2004,30(15):114-116. 被引量:1
  • 3王凤先,张岩,刘振鹏,王静红.基于系统调用的入侵检测规则的生成[J].计算机工程与应用,2005,41(3):75-76. 被引量:4
  • 4WANG Li-jun,GAO Chao.Rough set theory's application on intrusion detection based on system calls[DB/OL].http://www.worldscibooks.com/compsci/5966.html.
  • 5VINTERBO S,OHNO-MACHADO L.Minimal approximate hitting sets and rule templates[J].International Journal of Approximate Reasoning,2000,25(2):123-143.
  • 6DENNING D E.An intrusion-detection model[J].IEEE Transactions Software Engineering,1987,SE-13:222-232.
  • 7FORREST S,HOFMEYR S A,SOMAYAJI A,et al.A sense of self for unix processes[DB/OL].http://www.cs.unm.edu/~forrest/publications/ieee-sp-96-unix.pdf..
  • 8HOFMEYR S A,FORREST S,SOMAYAJI A.Intrusion detection using sequences of system calls[J].Jouranl of Computer Security,1998,6(3):151-180.
  • 9WARRENDER C,FORREST S.Detecting intrusions using system calls:alternative data models[DB/OL].http://www.cs.iastate.edu/~honavar/hmm-intrusion.pdf.
  • 10WAGNER D,SOTO P.Mimicry attack on host-based intrusion detection system[DB/OL].http://www.xcf.berkeley.edu/~paolo/ids-res/mimicry.pdf.

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部