期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
入侵防御系统的进程行为拦截技术研究 被引量:1
1
作者 刘云峰 《电脑开发与应用》 2011年第3期68-70,共3页
在网络安全问题日益严峻的今天,入侵防御系统是能够及时中断、调整或隔离一些不正常或是具有伤害性的网络资料传输行为的重要安全设备。入侵防御系统拦截技术的好坏直接关系到入侵防御系统的性能,分析了进程的攻击行为,对入侵防御系统... 在网络安全问题日益严峻的今天,入侵防御系统是能够及时中断、调整或隔离一些不正常或是具有伤害性的网络资料传输行为的重要安全设备。入侵防御系统拦截技术的好坏直接关系到入侵防御系统的性能,分析了进程的攻击行为,对入侵防御系统的进程行为拦截技术进行了研究探讨,并给出了控制进程的实例。 展开更多
关键词 入侵防御系统 进程 挂钩系统 API函数
下载PDF
基于攻击树模型的木马检测方法 被引量:2
2
作者 杨卫军 张舒 胡光俊 《信息网络安全》 2011年第9期170-172,共3页
计算机木马检测方法有文件静态分析、网络通信分析、系统调用挂钩分析、行为监控等,但单一方法不足以满足木马检测实践需求。通过构建木马攻击状态树模型确定木马策略集,并依据策略集进行木马检测,最终检测出木马并确定检测的量化收益,... 计算机木马检测方法有文件静态分析、网络通信分析、系统调用挂钩分析、行为监控等,但单一方法不足以满足木马检测实践需求。通过构建木马攻击状态树模型确定木马策略集,并依据策略集进行木马检测,最终检测出木马并确定检测的量化收益,然后反向推导木马安装、运行过程,并确定木马的量化难度。 展开更多
关键词 木马检测 攻击树 网络通信分析 系统调用挂钩分析 行为监控
下载PDF
谈城市高杆灯改造设计 被引量:1
3
作者 杜永帮 《山西建筑》 2012年第11期140-141,共2页
通过分析目前城市高杆灯存在的安全隐患,结合新一代高杆灯的技术特点,从灯杆改造、卷扬机改造、升降绳改造、增加挂钩系统、灯盘更换等方面提出了自己的想法,以提高现有高杆灯照明的可靠性。
关键词 高杆灯 改造 升降系统 双绳升降 挂钩系统
下载PDF
Detecting Compromised Kernel Hooks with Support of Hardware Debugging Features 被引量:3
4
作者 Shi Wenchang Zhou HongWei +1 位作者 Yuan JinHui Liang Bin 《China Communications》 SCIE CSCD 2012年第10期78-90,共13页
Although there exist a few good schemes to protect the kernel hooks of operating systems, attackers are still able to circumvent existing defense mechanisms with spurious context infonmtion. To address this challenge,... Although there exist a few good schemes to protect the kernel hooks of operating systems, attackers are still able to circumvent existing defense mechanisms with spurious context infonmtion. To address this challenge, this paper proposes a framework, called HooklMA, to detect compromised kernel hooks by using hardware debugging features. The key contribution of the work is that context information is captured from hardware instead of from relatively vulnerable kernel data. Using commodity hardware, a proof-of-concept pro- totype system of HooklMA has been developed. This prototype handles 3 082 dynamic control-flow transfers with related hooks in the kernel space. Experiments show that HooklMA is capable of detecting compomised kernel hooks caused by kernel rootkits. Performance evaluations with UnixBench indicate that runtirre overhead introduced by HooklMA is about 21.5%. 展开更多
关键词 operating system kernel hook integrity HARDWARE control flow
下载PDF
OPKH: A Lightweight Online Approach to Protecting Kernel Hooks in Kernel Modules
5
作者 田东海 李轩涯 +1 位作者 胡昌振 闫怀志 《China Communications》 SCIE CSCD 2013年第11期15-23,共9页
Kernel hooks are very important con- trol data in OS kernel. Once these data are com- promised by attackers, they can change the control flow of OS kemel's execution. Previ- ous solutions suffer from limitations in t... Kernel hooks are very important con- trol data in OS kernel. Once these data are com- promised by attackers, they can change the control flow of OS kemel's execution. Previ- ous solutions suffer from limitations in that: 1) some methods require modifying the source code of OS kernel and kernel modules, which is less practical for wide deployment; 2) other methods cannot well protect the kernel hooks and function return addresses inside kernel mo- dules whose memory locations cannot be pre- determined. To address these problems, we propose OPKH, an on-the-fly hook protection system based on the virtualization technology. Compared with previous solutions, OPKH off- ers the protected OS a fully transparent envi- ronment and an easy deployment. In general, the working procedure of OPKH can be di- vided into two steps. First, we utilise the me- mory virtualization for offiine profiling so that the dynamic hooks can be identified. Second, we exploit the online patching technique to in- strument the hooks for run-time protection. The experiments show that our system can pro- tect the dynamic hooks effectively with mini- mal performance overhead. 展开更多
关键词 kernel hook virtualization tech-nology online patching
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部