期刊文献+

系统调用序列的Markov模型及其在异常检测中的应用 被引量:13

A Markov Model of System Calls Sequence and Its Application in Anomaly Detection
下载PDF
导出
摘要 建立了计算机系统中系统调用序列的Markov模型,并在此模型的基础上提出了一种用于计算机异常检测的方法。文章利用统计方法分析进程中系统调用的发生情况,定义了一个依赖于状态转移概率的失配因子,并用它来计算失配率,由此判断被监视进程进行的操作是正常行为还是异常行为,文章还提出了一种基于遗忘因子的状态转移概率的更新算法。 The paper builds a Markov model of system calls sequence on computer system for intrusion detection, and introduces an anomaly detection method for computer systems. It analyses the current system calls sequences by using the knowledge on statistics, then defines a mismatch factor based on transition probabilities to compute the mismatch rate, and judges whether the process is in normal state or not by analyzing the mismatch rate. It also gives an updated algorithm of transition probabilities based on forgetting factor.
出处 《计算机工程》 CAS CSCD 北大核心 2002年第12期189-191,265,共4页 Computer Engineering
关键词 系统调用序列 MARKOV模型 异常检测 入侵检测 计算机系统 信息安全 Intrusion detection;Anomaly detection;System calls;Markov model
  • 相关文献

参考文献6

  • 1[1]Lindqvist U, Porras P A. Detecting Computer and Network Misuse Through the Production-based Expert System Toolset (P-BEST). In: Proceedings of the 1999 IEEE Symposium on Security and Privacy.Orkland California, 1999:146-161
  • 2[2]Hochberg J,Jackson K,Stallings C,et al.NADIR:An Automated System for Detection Network Intrusion and Misuse. Computer & Security, 1993,12(3): 235-248
  • 3[3]Smaha S E.Haystack:An Intrusion Detection System. In:Proceedings ofthe IEEE Fourth Aerospace Computer Security Applications Confe rence,Orlando,FL, USA,IEEE Computer Society Press, 1988:37-44
  • 4[4]Sebring M M,Shellhouse E,Hanna M E,et al. Expert Systems in Intrusion Detection:A Case Study. In Proceedings of the 1 lth National Computer Security Conference,Baltimore,Maryland,US A,NIST, 1988
  • 5[5]Lunt T F,Tamaru A,Gilham F,et aI.IDES:A Progress Report. In:Annual Computer Security Applications Conference,Tuscon,Arizona:IEEE Computer Society Press, 1990:273-285
  • 6[6]Forrest S,Hofmeyr S A,Somaya ii A,et al.A Sense of Self for Unix Processes.In:Proceedings of the 1996 IEEE Symposium on Security and Privacy,Orkland California, 1996:120-128

同被引文献69

引证文献13

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部