期刊文献+

Windows主机入侵防御系统研究综述

An overview study of Windows-based intrusion prevention system
下载PDF
导出
摘要 主机入侵防御是基于操作系统API监控的一种主动性安全防御技术,是面向客户端的安全解决方案。简要介绍该课题相关的技术背景和研究目标;系统论述主机入侵防御系统的防御思想、技术框架和基本特征;重点探讨Windows系统的API HOOK技术、基于API的行为监控和几种典型的异常行为分析技术,讨论各种行为分析技术的特点及其应用;最后指出该课题当前研究的技术瓶颈,并提出下一步研究的思路和方向。 Host-based intrusion prevention is an active security defense technology based on the operating system API monitoring, which is a security solution for the client-end. It briefly introduces the technical background and research objectives of the related topics. The prevention thought, framework and basic characteristics of host intrusion prevention system are presented and focused on the key technology of Windows API HOOK, behavior monitoring based on API and some of typical abnormal behavior analysis. And all the technology performance and aplication are provide. Finally the technical bottleneck of the current study is revealed and the countermeasures are given.
出处 《黑龙江工程学院学报》 CAS 2013年第3期63-66,共4页 Journal of Heilongjiang Institute of Technology
基金 黑龙江省教育厅资助项目(12531536)
关键词 入侵防御 主动防御 API HOOK行为分析 intrusion prevention active prevention API HOOK behavior analysis
  • 相关文献

参考文献10

  • 1NElL MAC DONALD. Understanding the Nine Protec- tion Styles of Host-Based Intrusion Prevention [R]. USA: Gartner Research Inc, 2005.
  • 2DAVID SOLOMON, MARK RUSSINOVICH. Mi- crosoft Windows Internals [R]. USA: Microsoft Press, 2004:2.
  • 3J. BOTWICZ, P. BUCIAK, P SAPIECHA. Building De- pendable Intrusion Prevention Systems [C]. Proc. Inter- national Conference on Dependability of Computer Sys- tems, 2006 : 135 142.
  • 4高岩,蒋若江.主机防护系统中系统调用截获机制的实现[J].计算机工程与设计,2003,24(11):76-80. 被引量:15
  • 5郭天杰,齐玉东.Windows 9x,NT和2000下的API拦截技术[J].计算机应用研究,2001,18(9):125-127. 被引量:6
  • 6MAHONEY M, CHAN P. Learning Rules for Anomaly Detection of Hostile Network Traffic[C]. Proc. Of the Third IEEE International Conference on Data Mining, 2003:247-249.
  • 7R. SEKAR, M. BENDRE, P. BOLLINENI, et al. A Fast Automaton-Based Method for Detecting Anomalous Pro- gram Behaviors [C]. IEEE Symposium on Security and Privacy, 2001.
  • 8HENRY HANPING FENG, OLEG M. KOLESNIK- OV,PRAHIAD FOGLA. Abnomaly detection using call stack information[C]. IEEE Symposium on Security and Privacy, 2003.
  • 9DARREN MUTZ, FREDRIK VALEUR, CHRISTO PHER KRUEGEL. Anomalous system call detection On the Detection of Anomalous System Call Arguments[C]. ACM Transactions on Information and System Security, 2006,9.
  • 10陆丽娜,陈亚萍,魏恒义,杨麦顺.挖掘关联规则中Apriori算法的研究[J].小型微型计算机系统,2000,21(9):940-943. 被引量:144

二级参考文献15

  • 1Jetfrey Richter.Windows核心编程[M].北京:机械工业出版社,2000..
  • 2Prasad Dabak, Sandeep Phadke, Milind Borate. Undocumented windows NT[M]. John Wiley & Sons, 1999.
  • 3David A Solomon, Mark E Russinovich. Inside microsoft Windows 2000,Third edition[M]. Microsoft Press, 2000.
  • 4Gary Nebbet. Windows NT/2000 native API reference[M].Que. 1 st edition, 2000.
  • 5Dmitri Leman.Tracing NT kemel-mode calls[EB/OL], WDJ,2000, (4). http://www.wdj.com/articles/2000/00E04/0004b/0004b.htm? topic=articles.
  • 6Mark Russinovich, Bryce Cogswell. Windows NT systemcall hooking[J]. Dobbs Journal, 1997,(1).
  • 7James Finnegan. Windows NT process monitoring[D]. MS J,1999.
  • 8Galen Hunt, Doug Brubacher. Detours: Binary Interception of Win32 functions [C]. Proceedings of the 3rd USENIX Windows NT Symposium. Seattle, WA, 1999.
  • 9Yona Hollander, Romain Agostini. Stop hacker attacks at theOS level [EB/OL], Intemet Security Advisor Magazine,2000, (9/10). http://www.entercept.com/products/entercept/news/intsecadvmag.pdf.
  • 10Sekar R, Bowen T, Segal M. On preventing intrusions by process behavior monitoring [C]. Usenix Intrusion Detection Workshop, 1999.

共引文献162

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部