期刊文献+

基于安全相关系统调用的非我检测 被引量:1

Detection of non-self based on system call related to security
下载PDF
导出
摘要 详细介绍了仿生计算机免疫系统中辨别“自我”、“非我”,以及对“非我”类型进行检测的结构。通过定义安全相关事件,提出了一种基于对与安全相关的系统调用进行“非我”检测的新方法,同时对测试程序“非我”类型的分布进行了讨论。实验证明了用此方法进行“非我”及其类型检测的有效性。 The structure of distinguishing between "self' and "non-self" and detecting the type of"non-self" in computer inunune system are introduced in detail. The concept of event related to security is defined, and a new method based on system call related to security is presented to detect non-self. At the same time the distributing of different types of non-self in testing program is discussed. The experiment verifies the effectiveness of the presented method.
出处 《计算机工程与设计》 CSCD 北大核心 2006年第11期1943-1945,共3页 Computer Engineering and Design
基金 河北省科技厅指导计划基金项目(3213502)
关键词 计算机免疫系统 系统调用 非我 检测 分类 分布 computer immunesystem system call non-self detection classification distributing
  • 相关文献

参考文献7

  • 1Forrest S,Hofmeyr S A,Somayaji A.Computer immunology[J].Communications of the ACM,1997,40(10):88-96.
  • 2Hofmeyr S A,Forrest S,Somayaji A.Intrusion detection using sequences of system calls[J].Journal of Computer Security,1998,6(3):151-180.
  • 3王凤先,刘振鹏,李继民,常胜.一种仿生物免疫的计算机安全系统模型[J].小型微型计算机系统,2003,24(4):698-701. 被引量:18
  • 4Forrest S,Hofemeyr S A,Somayaji A,et al.A sense of self for Unix processes[C].Proceedings of the 1996 IEEE Symposium on Computer Security and Privacy,1996.
  • 5刘海峰,卿斯汉,刘文清.安全操作系统的实时报警[J].计算机学报,2003,26(3):287-293. 被引量:6
  • 6张岩 王凤先 戴寒松 等.计算机免疫系统模型中类MC Agent的研究[J].计算机工程与应用,2004,(40):211-213.
  • 7Lee W,Stolfo S J.Data mining approaches for intrusion detection[C].Proceedings of the 7th USENIX Security Symposium,1998.

二级参考文献15

  • 1童竞亚.医学免疫学与微生物学(第三版)[M].北京:人民卫生出版社,1996.208.
  • 2GB17859-1999.中华人民共和国国家标准:计算机信息系统安全保护等级划分准则.[S].中国国家质量技术监督局,1999..
  • 3Miller B P, Koski D, Lee C P et al. Fuzz revisited: A re-examination of the reliability of UNIX utilities and services. Computer Sciences Department, University of Wisconsin, Wisconsin:Technical Report: CS-TR-95-1268, 1995
  • 4Lee W, Stolfo S J. Data mining approaches for intrusion detection. In: Proceedings of the 7th USENIX Security Symposium, San Antonio, Texas, US,1998
  • 5Wack J P, Carnahan L J. Keeping your site comfortably secure: An Introduction to Internet Firewalls. NIST Special Publication 800-10, U.S. DEPARTMENT OF COMMERCE. http://csrc.nist.gov/publications/nistpubs/800-10/
  • 6Hollingworth, Glaseman D S, Hopwood M. Security test and evaluation tools: An approach to operating system security analysis. Rand Corporation, Santa Monica, California:Technical Report P-5298, 1974
  • 7Abbott R P et al. Security analysis and enhancement of computer operating systems. NBSIR 76-1041, Nat1 Bureau of Standards, ICST, Gaithersburg, Md., Apr. 1976
  • 8Forrest S, Hofmeyr S A, Somayaji A, Longstaff T A. A sense of self for UNIX processes. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, Los Alamitos, CA, 1996. 120~128
  • 9Hofmeyr S A, Forrest S, Somayaji A. Intrusion detection using sequences of system calls. Journal of Computer Security, 1998,6(3):151~180
  • 10Kosoresow P, Hofmeyr S A. Intrusion detection via system call traces. IEEE Software, 1997,14(5): 35~42

共引文献21

同被引文献8

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部