期刊文献+

基于层次关系分析的一种软件行为检测方法 被引量:2

Software Behavior Detection Method Based on Hierarchical Relation Analysis
下载PDF
导出
摘要 为了提高软件行为判定的精确性,提出了一种基于层次关系分析的软件行为检测方法.首先,截获系统调用并提取动作特征,通过分析单一动作的栈返回地址、动作名称、绑定关系,关键属性得到点内关系,通过分析动作间的依赖和传递关系得到线间关系,并将各动作组成任务;然后,分析各任务间控制分支点动作的控制承接关系得到网间关系,进而利用这些层次关系生成软件行为模型;最后,比对待检测行为是否符合模型中记录的各动作之间关系,做出行为是否有害的判定.实验和分析结果表明:利用该方法能够准确描述动作流程,提高了检测准确度和效率. In order to improve the accuracy of software behavior's judgment, this paper proposes a detection method based on hierarchical relation analysis of software behavior. Firstly ,it intercepts the system call and from which extracts action characteristics ,then obtains internal relation by analyzing stack-return-address,action name,binding relation and key attribute in a single action, obtains line relation by analyzing dependency and transitive relation between the two actions,and some actions compose a task. What's more,it ac- quires interconnect relation by analyzing the control-order relation which among some different tasks. So the hierarchical relations con- struct software behavior model. Finally,it makes judgment that whether the behavior is harmful or not that comparing the hierarchical relation of the upcoming behavior with the relation in the model. The experiments and analysis results show that using this method can not only accurately describe the action process,but also has improved the detection accuracy and applicability.
出处 《小型微型计算机系统》 CSCD 北大核心 2014年第9期1949-1955,共7页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(61272125)资助 河北省自然科学基金和高等学校科学技术研究重点项目(F2011203234 ZH2011115)资助
关键词 软件行为 行为检测 系统调用 层次关系分析 software behavior behavior detection system calls hierarchical relation analysis
  • 相关文献

参考文献8

  • 1Hofmeyr SA,Forrest S,Somayaji A.Intrusion detection using sequence of system calls [J].Journal of Computer Security,1998,6(3):151-180.
  • 2Wepsi A,Daeier M,Debar H.Intrusion detection using variable length audit trail patterns [C].In:Proceedings of the 3 rd International Workshop on Recent Advances in Intrusion Detection.London,UK:Springer Veriag,2000:110-129.
  • 3Sekar R,Bendre M,Dhwjati 0,BolJineni P.A fast automationbased method for detecting anomalous program behaviors [C].In:Proceedings of IEEE Symposium on Security and Privacry,2001.
  • 4Kruegel C,Mutz 0,Valeur F,Vigna G.On the detection of anoma lous system call arguments[C].In:Proc.of European Symposium on Research in Computer Security,Gjovik,2003:101-118.
  • 5Sufatrio,Yap RUC.Improving host-based ids with argument abstraction to prevent mimicry attacks [C].In:Proceedings of the 8 th Int'l Symp.on Recent Advances in Intrusion Detection,Seattle,2005.
  • 6傅建明,陶芬,王丹,张焕国.基于对象的软件行为模型[J].软件学报,2011,22(11):2716-2728. 被引量:20
  • 7Wagner D,Soto P.Mimicry attacks on host based intrusion detection systems [C].In:Proceedings of the 9th ACM Conf.on Computer and Communications Security,Washington,2002:255-264.
  • 8李闻,戴英侠,连一峰,冯萍慧.基于混杂模型的上下文相关主机入侵检测系统[J].软件学报,2009,20(1):138-151. 被引量:31

二级参考文献19

  • 1苏璞睿,杨轶.基于可执行文件静态分析的入侵检测模型[J].计算机学报,2006,29(9):1572-1578. 被引量:14
  • 2Denning D. An intrusion detection model. IEEE Trans. on Software Engineering, 1987,13(2):222-232.
  • 3Forrest S. A sense of self for UNIX processes. In: Proc. of the IEEE Symp. on Security and Privacy. Oakland: IEEE Press, 1996. 120-128. http://www.cs.unm.edu/-forrest/publications/ieee-sp-96-unix.pdf
  • 4Hofmeyr SA, Forrest S, Somayaji A. Intrusion detection using sequences of system calls. Journal of Computer Security, 1998, 6(3):151-180.
  • 5Helman P, Bhangoo J. A statistically based system for prioritizing information exploration under uncertainty. IEEE Trans. on Systems, Man and Cybernetics, Part A: Systems and Humans, 1997,27(4):449466.
  • 6Lee W, Stolfo SJ. Data mining approaches for intrusion detection. In: Proc. of the 7th USENIX Security Syrup. San Antonio, 1998. 26-40. http://www.usenix.org/publications/library/proceedings/sec98/full_papers/lee/lee.pdf
  • 7Lee W, Stolfo SJ, Chan PK. Learning patterns from UNIX process execution traces for intrusion detection. In: AAAI Workshop on AI Approaches to Fraud Detection and Risk Management. AAAI Press, 1997. 50-56. http://www.cc.gatech.edu/-wenke/papers/ osid paper.ps
  • 8Sekar R, Bcndre M, Bollineni P, Dhurjati D. A fast Automaton-Based method for detecting anomalous program behaviors. In: IEEE Symp. on Security and Privacy. Oakland: IEEE Press, 2001. 144-155. http://www.cc.gatech.cdu/-wcnkc/ids-readings/automaton. pdf
  • 9Feng HH, Kolesnikov OM, Fogla P, Lee W, Gong W. Anomaly detection using call stack information. In: Proc. of the 2003 IEEE Syrup. on Security and Privacy. Oakland: IEEE Press, 2003.62-75. http://www-unix.ecs.umass.edu/-gong/papers/ok_idpc.pdf
  • 10Wagner D, Dean D. Intrusion detection via static analysis. In: Proc. of the IEEE Symp. on Security and Privacy. Oakland: IEEE Press, 2001. 156-168. http://www.csl.sri.com/users/ddean/papers/oakland01.pdf

共引文献44

同被引文献15

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部