作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2008, Vol. 34 ›› Issue (2): 1-3. doi: 10.3969/j.issn.1000-3428.2008.02.001

• 博士论文 •    下一篇

基于系统调用和数据挖掘的程序行为异常检测

田新广1,2,邱志明1,李文法2,3,孙春来2,段洣毅2,3   

  1. 田新广1,2,邱志明1,李文法2,3,孙春来2,段洣毅2,3
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2008-01-20 发布日期:2008-01-20

Anomaly Detection of Program Behaviors Based on System Calls and Data Mining

TIAN Xin-guang1,2, QIU Zhi-ming1, LI Wen-fa2,3, SUN Chun-lai2, DUAN Mi-yi2,3   

  1. TIAN Xin-guang1,2, QIU Zhi-ming1, LI Wen-fa2,3, SUN Chun-lai2, DUAN Mi-yi2,3
  • Received:1900-01-01 Revised:1900-01-01 Online:2008-01-20 Published:2008-01-20

摘要: 异常检测是目前入侵检测研究的主要方向之一。该文提出一种新的程序行为异常检测方法,主要用于Linux或Unix平台上以系统调用为审计数据的入侵检测系统。该方法利用数据挖掘技术中的序列模式对特权程序的正常行为进行建模,根据系统调用序列的支持度和可信度在训练数据中提取正常模式。在检测阶段,通过序列模式匹配对被监测程序的行为异常程度进行分析,提供两种可选的判决方案。实验结果表明,该方法具有良好的检测性能。

关键词: 入侵检测, 异常检测, 系统调用, 数据挖掘

Abstract: Anomaly detection acts as one of the important directions of research on intrusion detection. This paper presents a new method for anomaly detection of program behaviors, which is applicable to intrusion detection systems using system calls as audit data on Linux or Unix platform. The method uses sequence patterns in data mining technique to model the normal behavior of a privileged program, and extracts normal system call sequences according to their support and confidence in the training data. At the detection stage, system call sequences are matched to perform the comparison of the historic behaviors and current behaviors, and then two alternative schemes can be used to distinguish between normal and anomalous behaviors. The experimental results show that the method can achieve high detection performance.

Key words: intrusion detection, anomaly detection, system call, data mining

中图分类号: