期刊文献+

GECISM中沙盒主机的“非我”检测与分类 被引量:2

Detection and Classification of "Non-self" in Sand Box of GECISM
下载PDF
导出
摘要 对仿生免疫系统GECISM(General Computer Immune System Model),沙盒主机是其中的一个主要代理。文章详细介绍了沙盒主机中“非我”检测与分类的结构。通过定义安全相关调用,对采集形成的安全相关调用短序列进行训练,生成序列库和规则库,从而对“非我”进行检测和分类,同时对测试程序“非我”类型的分布进行了讨论。实验证明了用此方法进行“非我”检测和分类的可行性和高效性。 Sand box is a main component of agents in GECISM.The structure of detection and classification of "non-self" in sand box is introduced in detail.The concept of system call related to security is defined, and sequence library and rule library are built by training short sequences of system call related to security.Then "non-self" can be detected and classified,and the distributing of different types of "non-self" in testing program is discussed.The experiment verifies the feasibility and effectiveness of this method.
出处 《计算机工程与应用》 CSCD 北大核心 2005年第35期129-131,182,共4页 Computer Engineering and Applications
基金 河北大学校内课题项目(编号:2003Z06)
关键词 计算机免疫系统 系统调用序列 “非我”检测 分类 分布 computer immune system,sequence of system call,"non-self",detection,classification,distributing
  • 相关文献

参考文献7

二级参考文献17

  • 1童竞亚.医学免疫学与微生物学(第三版)[M].北京:人民卫生出版社,1996.208.
  • 2王凤先 常胜 刘振鹏 等.一种计算机免疫系统的总体结构模型[A]..2002全国开放式分布与并行计算学术会议(DPCS2002)论文集[C].武汉:华中科技大学出版社,2002.72~76.
  • 3GB17859-1999.中华人民共和国国家标准:计算机信息系统安全保护等级划分准则.[S].中国国家质量技术监督局,1999..
  • 4WuJ 高传善 等译.分布式系统设计[M].北京:机械工业出版社,2001..
  • 5Miller B P, Koski D, Lee C P et al. Fuzz revisited: A re-examination of the reliability of UNIX utilities and services. Computer Sciences Department, University of Wisconsin, Wisconsin:Technical Report: CS-TR-95-1268, 1995
  • 6Lee W, Stolfo S J. Data mining approaches for intrusion detection. In: Proceedings of the 7th USENIX Security Symposium, San Antonio, Texas, US,1998
  • 7Wack J P, Carnahan L J. Keeping your site comfortably secure: An Introduction to Internet Firewalls. NIST Special Publication 800-10, U.S. DEPARTMENT OF COMMERCE. http://csrc.nist.gov/publications/nistpubs/800-10/
  • 8Hollingworth, Glaseman D S, Hopwood M. Security test and evaluation tools: An approach to operating system security analysis. Rand Corporation, Santa Monica, California:Technical Report P-5298, 1974
  • 9Abbott R P et al. Security analysis and enhancement of computer operating systems. NBSIR 76-1041, Nat1 Bureau of Standards, ICST, Gaithersburg, Md., Apr. 1976
  • 10Forrest S, Hofmeyr S A, Somayaji A, Longstaff T A. A sense of self for UNIX processes. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, Los Alamitos, CA, 1996. 120~128

共引文献24

同被引文献10

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部