期刊文献+

GECISM中缓冲溢出类非我的识别

Detection of Buffer-OverFlow Based on GECISM
下载PDF
导出
摘要 缓冲区溢出攻击技术目前是一项广泛而基础的攻击技术,也是目前攻击技术的主要发展方向。缓冲溢出攻击常用手段就是通过改变程序的执行流程,转而去执行其植入的入侵代码,进而获得系统的root权限,对系统安全构成了巨大的威胁。该文在模仿生物免疫系统设计的计算机安全系统模型GECISM基础上构建了DAE Agent。通过RC4.5算法实对入侵训练集的系统调用序列进行规则提取,从而此代理实现了对缓冲溢出类入侵的检测。 Buffer-Overflow attacks has been the common and basic attack technology,and nowadays it is also the main direction of attack technology.The common method of buffer-overflow is to change the order of program execution in order to execute the code which is written by intruder.By this way,intruder can get the root access,and it willtake great threat to the system. The article constructs the DAE (Detecting and Eliminating)on the GECISM.The agent can detect intrusion with the rule which is formed by the RC4.5 Algorithm.
出处 《电脑知识与技术》 2009年第6X期4987-4989,共3页 Computer Knowledge and Technology
关键词 缓冲溢出 系统调用 DAE Agent 识别 GECISM buffer-overflow system-call DAE agent detection GECISM
  • 相关文献

参考文献7

二级参考文献39

  • 1艾宝利,丁在田.软件无线电及其在军事通信中的应用[J].现代电子技术,2005,28(7):22-24. 被引量:4
  • 2童竞亚.医学免疫学与微生物学(第三版)[M].北京:人民卫生出版社,1996.208. 被引量:3
  • 3何球藻 吴厚生.医学免疫学[M].上海:上海医科大学出版社,2000.. 被引量:2
  • 4Debar H, Dacier M, Wespi A. Toward a taxonomy of intrusion-detection systems. Computer Networks, 1999,31(8):805-822. 被引量:1
  • 5Ye N, Li XY, Chen Q, Emran SM, Xu MM. Probabilistic techniques for intrusion detection based on computer audit data IEEE Trans. on Systems, Man, and Cybernetics-Part A: Systems and Humans, 2001,31(4):266-274. 被引量:1
  • 6Ko C, Fink G, Levitt K. Automated detection of vulnerabilities in privileged programs byexecution monitoring. In: Proc. of the 10th Annual Computer Security Applications Conf Orlando: IEEE Computer Society Press 1994. 134~144. 被引量:1
  • 7Bernaschi M, Gabrielli E, Mancini LV. REMUS: A security-enhanced operating system. ACM Trans. on Information and System Security, 2002,5(1):36-61. 被引量:1
  • 8Goldberg I, Waqner D, Thomas R, Brewer EA. A secure environment for untrusted helper applications. In: Proc. of the 6th USENIX UNIX Security Symp San Jose: USENIX, 1996. 1-13. 被引量:1
  • 9Marty R. Snort-Lightweight intrusion detection for networks In: Proc. of the 13th Conf. on Systems Administration. Washington:USENIX, 1999.229-238. 被引量:1
  • 10Warrender C, Forrest S, Pearlmutter B. Detecting intrusions using system calls:alternative data models. In: Proc. of the 1999 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society Press, 1999. 133~145. 被引量:1

共引文献74

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部