首页> 外文会议>2007 International Conference on Computational Intelligence and Security(CIS 2007): Proceedings >A Typical Set method of Intrusion Detection Technology Base on Computer Audit data
【24h】

A Typical Set method of Intrusion Detection Technology Base on Computer Audit data

机译:基于计算机审计数据的入侵检测技术典型集方法

获取原文
获取原文并翻译 | 示例

摘要

The signature database of intrusion detection system is usually built by the short sequences of system call.The real-time efficiency and accuracy of intrusion detection is greatly influenced by the scale of signature database and the approach of intrusion data analysis.In this paper,a typical set method is provided to compress the normal signature database.Using the data set of UNM CERT sendmail for testing,the feasibility of typical set method is validated,and a proper rate of typical set for intrusion detection is proposed Meanwhile,the LSM (Linux Security Modules) framework is presented to hook system calls and other audit data from operation system to build intrusion detection system signature database and identify intrusion activity.A system service process oriented detection idea is also introduced to make the intrusion detection more pertinent and accurate.Abnormal detection experiments results show good performance of our intrusion detection method.
机译:入侵检测系统的签名数据库通常是通过较短的系统调用序列来构建的。入侵检测的实时性和准确性受签名数据库的规模和入侵数据分析方法的影响很大。提供了一种典型的方法来压缩普通签名库。利用UNM CERT sendmail的数据集进行测试,验证了典型方法的可行性,并提出了合适的典型率进行入侵检测。提出了安全模块框架,以从操作系统中挂接系统调用和其他审核数据以构建入侵检测系统签名数据库并识别入侵活动,并引入了面向系统服务过程的检测思想,以使入侵检测更加相关和准确。检测实验结果表明我们的入侵检测方法性能良好。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号