Author Login Editor-in-Chief Peer Review Editor Work Office Work

Computer Engineering ›› 2010, Vol. 36 ›› Issue (12): 153-155. doi: 10.3969/j.issn.1000-3428.2010.12.052

• Networks and Communications • Previous Articles     Next Articles

Intrusions Detection Method Based on Parameters of System Call

HUANG Guo-yan, GAO Jian-pei, CHANG Xu-liang   

  1. (School of Information Science and Engineering, Yanshan University, Qinhuangdao 066004)
  • Online:2010-06-20 Published:2010-06-20

基于系统调用参数的入侵检测方法

黄国言,高健培,常旭亮   

  1. (燕山大学信息科学与工程学院,秦皇岛 066004)
  • 作者简介:黄国言(1969-),男,教授、博士,主研方向:入侵检测,网络协同技术,电子商务;高健培、常旭亮,硕士研究生
  • 基金资助:
    河北省自然科学基金资助项目(F2009000477)

Abstract: According to the present number of new attacks found that these systems can be evaded by launching attacks that execute legitimate system call sequences. The emergence of such an attack is inevitable because the system call sequence based on the intrusion detection system is not take into account all available features of system calls. A new method is proposed to construct parameter model of detection system by using parameters of system call. Experimental results indicate that the proposed method can achieve higher hit rates for detecting the mimicry attack.

Key words: mimicry attack, parameters of system call, intrusion detection system

摘要: 基于系统调用序列的入侵检测系统没有考虑所有的系统调用特性,导致一些新型的攻击行为通过伪装能绕过基于系统调用序列的入侵检测系统的检测。针对上述攻击行为,提出一种基于系统调用参数的入侵检测系统模型。实验结果表明,该系统对伪装的系统调用有很高的检测率。

关键词: 伪装攻击, 系统调用参数, 入侵检测系统

CLC Number: