期刊文献+

一种基于审计的入侵检测模型及其实现机制 被引量:15

A New Audit-Based Intrusion Detection Model and Its Implement Mechanism
下载PDF
导出
摘要 文中对基于系统调用序列的入侵检测进行了深入的研究 ,提出了一种新的基于审计事件向量的入侵检测模型 (AUDIDS) .这一模型除了具有系统调用序列入侵检测模型的优点外 ,比之已有的模型具有更丰富的语义及更高的效率 .针对此模型 ,文中还给出了此模型在linux上的实现机制 ,实现了审计事件的定义、收集和存储 ,并对正常库的存储及匹配方法进行了改进 . Intrusion detection models based on system call sequence are discussed,and a new intrusion detection model based on audit event vector which is named 'AUDIDS' is presented.This model has not only the merits of the previous IDS model but also richer semantics and higher efficiency.We describe its implementation mechanism on Linux which defines,collects and stores audit event and improves the storage and matching of normal database.
出处 《电子学报》 EI CAS CSCD 北大核心 2002年第8期1167-1171,共5页 Acta Electronica Sinica
基金 国家自然科学基金 (No 60 0 830 0 7) 国家重点研究发展规划 973资助项目 (No G1 9990 3581 0 )
关键词 审计 入侵检测 LINUX 计算机安全 AUDIDS 系统调用序列 audit intrusion detection linux computer security
  • 相关文献

参考文献9

  • 1Barton P Miller,David Koski,Cjin Pheow Lee,etc.Fuzz revisited:A re-examination of the reliability of UNIX utilities and services [R].Technical report,CS-TR -95-1268,Computer Sciences Department,University of Wisconsin,1995.
  • 2W Lee,S J Stolfo.Data mining approaches for intrusion detection [A].In Proceed ings of the 7th USENIX Security Symposium [C].San Antonio,Texas,USA:1998.
  • 3John P Wack,Lisa J Carnahan.Keeping your site comfortably secure: An Introductio n to Internet Firewalls [DB/OL].NIST Special Publication 800-10,U.S.DEPARTMENT OF COMMERCE. .
  • 4S Forrest,S A Hofmeyr,A Somayaji,T A Longstaff.A sense of self for UNIX processe s [A].In Proceedings of the 1996 IEEE Symposium on Security and Privacy [C]. Los Alamitos,CA:1996.120-128.
  • 5S A Hofmeyr,S Forrest,A Somayaji.Intrusion detection using sequences of system c alls [J].Journal of Computer Security,1998,6:151-180.
  • 6W Lee,S J Stolfo,P K Chan.Learning patterns from UNIX process execution traces f or intrusion detection [A].AAAI Workshop on AI Approaches to Fraud Detection a nd Risk Management [C].AAAI Press,1997.7:50-56.
  • 7G G Helmer,J S K Wong,V Honavar,L Miller.Intelligent agents for intrusion detect ion [A].In Proceedings IEEE Information Technology Conference [C].Syracuse,N Y:1998.121-124.
  • 8C Warrender,S Forrest,B Pearlmutter.Detecting intrusions using system calls:alte rnative data models [A].In Proceedings of the 1999 IEEE Symposium on Security and Privacy [C].Los Alamitos,CA:IEEE Computer Society,1999.133-145.
  • 9Wojciech Purczynski.Sendmail & procmail local root exloits on Linux kernel up to 2.2.16pre5 [DB/OL].BUGTRAQ Mailing list(bugtraq@securityfocus.com),2000-06-09 .

同被引文献153

引证文献15

二级引证文献143

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部