期刊文献+

一种基于资源操作域的主机防护模型 被引量:4

A Model for Protecting Host Based on Resource Operation Domain
在线阅读 下载PDF
导出
摘要 论文提出了一种基于资源操作域的主机防护模型,该模型抛开了基于网络攻击数据特征码匹配构建主机防护系统的传统思路,从系统资源入手,立足于控制进程行为,力求建立一个授权访问系统资源的进程以及操作方法的最小集合。讨论了该模型的构建和运用方法,包括:通过采样、学习和修正这一反复过程构建目标系统的资源操作域;设置防护检查点、截获系统调用、基于资源操作域的检索和匹配等操作进行行为合法性验证。最后,对该模型进行了性能分析。 In this paper,a model is proposed for protecting host based on Resource Operation Domain.The model discards the traditional thought,which using pattern matching for protecting host based on network attack data.At beginning of system resource,control the process behaviors and construct the least set of authorized system processes and processes operated method for special system resource.Construction and using of the model are discussed thoroughly. The ROD of special system is constructed through an iterated process of sampling,learning and modifying.Setting the protected check point,capturing the special system call,searching and matching the ROD validate the system behaviors. At last,performance of the model is analyzed.
出处 《计算机工程与应用》 CSCD 北大核心 2006年第5期152-155,共4页 Computer Engineering and Applications
关键词 主机防护 进程域 资源域操作集 资源操作域 host protected,process domain,resource domain,operation set,resource operation domain
  • 相关文献

参考文献9

  • 1Gao Yan.The Research and Implement of systematic protected technology for limited system[D].Academic dissertation.
  • 2Liu Baoxiu,Xu Rongsheng.Classified studies of Hacker's Attack Behaviors[J].Network Security Technology and Application ,2003 ; (4).
  • 3Anthony Mason.Windows NT Device Driver Development.Peter Viscarola.
  • 4James Finnegan.How to notify user-mode applications asynchronously from kernel mode[J],MSJ, 1999-07.
  • 5R Sekar,T Bowen,M Segal.On Preventing Intrusions by Process Behavior Monitoring.
  • 6Pu,Perry Wagle,Virgil Gligor.Parsimonious Server Security[C],In: Crispin Cowan,Steve Beattie,Greg Kroah-Hartman,Calton eds.The USENIX LISA 2000 Conference.
  • 7Yona Hollander,Romain Agostini.Stop Hacker Attacks at the OS Level[J].INTERNET SECURITY ADVISOR - SEPTEMBER/OCTO- BER,2000, (5).
  • 8Preventing Attacks to the Host Iain Franklin Information Security. Bulletin CHI Publishing Ltd.
  • 9刘宝旭,许榕生.黑客攻击行为的分层分类法研究[J].网络安全技术与应用,2003(4):46-51. 被引量:3

二级参考文献3

共引文献2

同被引文献18

  • 1张铮,高志森,李俊.改进贝叶斯分类算法在入侵检测中的研究[J].计算机技术与发展,2007,17(1):174-176. 被引量:4
  • 2Dieter Gollmann.Computer security[M].北京:人民邮电出版社,2003.
  • 3黄振刚.基于软件行为控制的系统安全的研究[D].南京:南京大学出版社,2004.
  • 4Jeffrey Richter.Programming applications for Microsoft Windows[M].4th ed.北京:机械工业出版社,2004:546-547.
  • 5郭林.二层架构的特洛伊木马深度防御体系[D].南京:南京大学出版社,2006.
  • 6Sekar R,Thomas F Bowen,Mark E Segal.On preventing instrusions by process behavior monitoring[C] Berkeley,CA,USA:USENIX Association,1999:29-40.
  • 7Gao Yan.The research and implement of systematic protected technology for limited system[D].长沙:湖南大学出版社,2005.
  • 8HUNT G, BRUBACHER D. Detours: Binary interception of Win32 functions[ C]// Proceedings of the 3rd USENIX Windows NT Symposium. Seattle, WA: USENIX, 1999:135 - 143.
  • 9郝东白,郭林,黄皓.基于Hook的程序异常行为检测系统设计与实现[J].计算机工程与设计,2007,28(18):4373-4376. 被引量:9
  • 10龙灿.面向教学的网络攻击分类法研究[J].计算机与数字工程,2007,35(12):93-96. 被引量:1

引证文献4

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部