期刊文献+

基于系统调用的入侵检测系统设计与实现 被引量:2

Design and implementation of intrusion detection system based on system-call
在线阅读 下载PDF
导出
摘要 介绍了一个基于系统调用的灵活加载的入侵检测系统。该系统改进了常用的数据采集方法,采用虚拟设备驱动来获取系统调用。这种数据采集方法对系统影响小,可以灵活装卸,并提供标准的接口。数据分析融合了异常检测和误用检测两种方法,提出了相应的检测模型,并引入了滤噪函数。 The technology of Intrusion Detection is one of the important measures to protect the networks. Host-based intrusion detection is used to protect the key hosts. A flexible loading intrusion detection based on system-call was introduced in this paper. This system improved the common data collection method, and adopted virtual equipment driversto acquire system call. This method brings small influence on system, is easy to load and unload, and provides the standard interface. The data analysis integrates the two detection methods: anomaly and misuse, which provides corresponding detection models and introduces the noise filtering function.
出处 《计算机应用》 CSCD 北大核心 2006年第9期2137-2139,2144,共4页 journal of Computer Applications
基金 国家973规划资助项目(G1999035802) 国家杰出青年基金项目(60025205)
关键词 入侵检测 系统调用 虚拟设备驱动 滤噪函数 非层次聚类 intrusion detection system call virtual equipment drives noise filtering function nonhierarchical clustering
  • 相关文献

参考文献1

二级参考文献7

  • 1Yun QX, Huang GQ, Wang ZQ. Genetic Algorithm and Genetic Programming. Beijing: Publishing House of Metallurgy Industry,1997 (in Chinese).
  • 2Forrest S, Hofmeyr SA, Somayaji A, Longstaff TA. A sense of self for Unix process. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, 1996.
  • 3Hofmeyr SA, Forrest S. Architecture for an artificial immune system. Evolutionary Computation Journal, 2000,8(4):443-473.
  • 4Warrender C, Forrest S, Pearlmutter B. Detecting intrusions using system calls: Alternative data models. In: Proceedings of the1999 IEEE Symposium on Security and Privacy. 1999.
  • 5Lee W, Stolfo SJ. Data mining approaches for intrusion detection. In: Proceedings of the 7th USENIX Security Symposium. 1998.
  • 6Lee W, Stolfo SJ, Mok KW. A data mining framework for building intrusion detection models. In: Proceedings of the 1999 IEEE Symposium on Security and Privacy. Oakland, CA, May 1999.
  • 7IATF Release 3.0, Host-Based Detect & Respond Capabilities Within Computing Environments. 2000.

共引文献18

同被引文献39

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部