期刊文献+

安全操作系统的实时报警 被引量:6

Real-time Alert of Secure OS
下载PDF
导出
摘要 提出了一种安全操作系统实时报警的方法 ,它首先通过监控系统正常状态下产生的审计事件串 ,得到系统的正常状态 ,即正常库 ;然后 ,以正常库为标准对系统产生的审计事件串进行实时监控 ,如果发现偏离正常库的审计事件串 。 This paper presents a method for real-time detecting intrusions in privileged programs by monitoring their execution using audit events in Secure OS. First, it learns the normal behavior by monitoring audit events of privileged programs in gear, and builds normal database, then, monitors process behavior for significant deviations and alert to system when happen.
出处 《计算机学报》 EI CSCD 北大核心 2003年第3期287-293,共7页 Chinese Journal of Computers
基金 国家自然科学基金 ( 60 0 83 0 0 7) 国家"九七三"重点研究发展规划项目(G19990 3 5 810 )资助
关键词 安全操作系统 实时报警 审计 入侵检测 计算机 Monitoring Real time systems Security systems
  • 相关文献

参考文献13

  • 1Miller B P, Koski D, Lee C P et al. Fuzz revisited: A re-examination of the reliability of UNIX utilities and services. Computer Sciences Department, University of Wisconsin, Wisconsin:Technical Report: CS-TR-95-1268, 1995
  • 2Lee W, Stolfo S J. Data mining approaches for intrusion detection. In: Proceedings of the 7th USENIX Security Symposium, San Antonio, Texas, US,1998
  • 3Wack J P, Carnahan L J. Keeping your site comfortably secure: An Introduction to Internet Firewalls. NIST Special Publication 800-10, U.S. DEPARTMENT OF COMMERCE. http://csrc.nist.gov/publications/nistpubs/800-10/
  • 4Hollingworth, Glaseman D S, Hopwood M. Security test and evaluation tools: An approach to operating system security analysis. Rand Corporation, Santa Monica, California:Technical Report P-5298, 1974
  • 5Abbott R P et al. Security analysis and enhancement of computer operating systems. NBSIR 76-1041, Nat1 Bureau of Standards, ICST, Gaithersburg, Md., Apr. 1976
  • 6Forrest S, Hofmeyr S A, Somayaji A, Longstaff T A. A sense of self for UNIX processes. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, Los Alamitos, CA, 1996. 120~128
  • 7Hofmeyr S A, Forrest S, Somayaji A. Intrusion detection using sequences of system calls. Journal of Computer Security, 1998,6(3):151~180
  • 8Kosoresow P, Hofmeyr S A. Intrusion detection via system call traces. IEEE Software, 1997,14(5): 35~42
  • 9Lee W, Stolfo S J, Chan P K. Learning patterns from UNIX process execution traces for intrusion detection. In:Proceedings of AAAI Workshop on AI Approaches to Fraud Detection and Risk Management, Menlo Park, CA,1997. 50~56
  • 10Helmer G G, Wong J S K, Honavar V, Miller L. Intelligent agents for intrusion detection. In: Proceedings of IEEE Information Technology Conference, Syracuse, NY,1998.121~124

共引文献1

同被引文献25

引证文献6

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部