期刊文献+

一个基于系统调用的主机入侵检测系统的传感器实现方案 被引量:2

Sensor Implementation of Host Instrusion Detection System Based on System Call
下载PDF
导出
摘要 linux系统调用信息对于描述主机系统的安全状态有重要的作用,论文分析了linux系统调用信息在入侵检测中的应用;阐述了入侵检测系统HostKeeper中系统调用传感器的原形框架、软件设计和实现方法;并给出了利用linux系统调用信息进行入侵检测的实验结果。 The information of linux system call plays an important role in describing the security state of computer system.There are more and more attentions put in this research area.This paper analyzes the utility of system call infor-mation in intrusion detection,discusses the prototype architecture,software design and realizing method of system call sensor in intrusion detection system HostKeeper,and gives the experiment result of HostKeeper in intrusion detection.
作者 邵萍 彭勤科
出处 《计算机工程与应用》 CSCD 北大核心 2003年第26期119-121,128,共4页 Computer Engineering and Applications
基金 国家863高技术研究发展计划(编号:2001AA140213)资助
关键词 linux系统调用 入侵检测 网络安全 异常检测 linux system call,intrusion detection,network security,abnormity detection
  • 相关文献

参考文献6

  • 1JohnLions著 尤晋元译.莱昂氏unix源代码分析[M].,..
  • 2S Forrest,S A Hofmeyr et al.A sense of self for Unix processes[C].In:Proceedings of 1996 IEEE Symposium on Computer Security and Privacy, 1996.
  • 3Wenke Lee,Sal Stolfo,Phil Chan.Learning Patterns from Unix Process Execution Traces for Intrusion Detection.AAAI Workshop:AI Approaches to Fraud Detection and Risk Management, 1997-07.
  • 4Asaka M ,Onabuta T,Inoue T et al.A new intrusion detection method based on discriminant analysis[J].IEICE Transactions on Information and Systems,2001;E84D(5):570-577.
  • 5Scott Maxwell.linux core kernel commentary.2000.
  • 6Alessandro Rubini,Jonathan Corbet.linux device drivers[M].2001.

同被引文献35

  • 1卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:234
  • 2曹元大,徐漫江.一种基于系统调用分析的入侵检测方法及其应用[J].计算机工程,2004,30(15):114-116. 被引量:1
  • 3王凤先,张岩,刘振鹏,王静红.基于系统调用的入侵检测规则的生成[J].计算机工程与应用,2005,41(3):75-76. 被引量:4
  • 4Kim Gene H,Spafford Eugene H.The design and implementation of tripwire:A file system integrity checker[R].West Lafayette:Purdue University,1993.
  • 5Pennington Adam G,Strunk John D,John Linwood Griffin.Storage-based intrusion detection:Watching storage activity for suspicious behavior[C].Washington DC:Proceedings of the 12th USENIX Security Symposium,2003.
  • 6WANG Li-jun,GAO Chao.Rough set theory's application on intrusion detection based on system calls[DB/OL].http://www.worldscibooks.com/compsci/5966.html.
  • 7VINTERBO S,OHNO-MACHADO L.Minimal approximate hitting sets and rule templates[J].International Journal of Approximate Reasoning,2000,25(2):123-143.
  • 8DENNING D E.An intrusion-detection model[J].IEEE Transactions Software Engineering,1987,SE-13:222-232.
  • 9FORREST S,HOFMEYR S A,SOMAYAJI A,et al.A sense of self for unix processes[DB/OL].http://www.cs.unm.edu/~forrest/publications/ieee-sp-96-unix.pdf..
  • 10HOFMEYR S A,FORREST S,SOMAYAJI A.Intrusion detection using sequences of system calls[J].Jouranl of Computer Security,1998,6(3):151-180.

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部