:::

詳目顯示

回上一頁
題名:設計一個適用一般人的主機入侵防禦系統
書刊名:正修學報
作者:許博學
作者(外文):Hsu, Po-hsueh
出版日期:2009
卷期:22
頁次:頁197-209
主題關鍵詞:資訊安全主機入侵防禦系統惡意程式開機啟動Information securityHost intrusion prevention systemMalwareAuto-start
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(3) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:2
  • 點閱點閱:19
爲因應零時差攻擊,目前防毒軟體都會結合HIPS的行爲分析技術,訂定規則來檢視異常行爲並且判斷是否爲入侵攻擊。但是一般HIPS普遍存在三項缺失:過高的誤報率、執行效能不佳、與不適合非資訊專長的一般人使用。本論文討論如何設計一個適用於一般人的主機入侵防禦系統,簡稱USHIPS。它具備低誤報率、僅佔用少量電腦資源、以及適合一般人使用等三項特色。USHIPS主要挑戰,在於即時性與全面性偵測開機啟動註冊事件,並且要能夠自動取消註冊,達成阻斷惡意程式入侵的目標。
In order to prevent zero-day attacks, behavior analysis technique in HIPS is integrated into current anti-virus software, and tries hard to identify intrusion by examining anomaly behaviors through multiple rules. But in general, there are three drawbacks in HIPS: high false alarm rate, poor performance, and not suitable for average users who are not IT specialists. Therefore we design a USHIPS (User-Suited Host Intrusion Prevention System) to address these issues. The USHIPS will demonstrate three major features: low false alarm rate, using only small amount of computer resources, and being suitable for average users. Main challenges of the USHIPS are to fulfill function requirements of both real-time and total detection of any auto-start registry event, and the capability of automatic registry cancellation to prevent malware intrusion.
期刊論文
1.Ye, N.、Emran, S. M.、Chen, Q.、Vilbert, S.(2002)。Multivariate statistical analysis of audit trails for host-based intrusion detection。IEEE Transactions on Computers,51,810-820。  new window
2.許博學(20081100)。實作一個即時啟動監視器。正修學報,21,77-92。new window  延伸查詢new window
3.Patcha, Animesh、Park, Jung-Min(200708)。An overview of anomaly detection techniques: Existing solutions and latest technological trends。Computer Networks,51(12),3448-3470。  new window
4.Tian, Shengfeng、Mu, Shaomin、Yin, Chuanhuan(200701)。Sequence-similarity kernels for SVMs to detect anomalies in system calls。Neurocomputing,70(4),859-866。  new window
5.Rowan, Tom(200709)。Intrusion prevention systems: superior security。Network Security,2007(9),11-15。  new window
6.Schultz, E.、Eugene, Ray. Edward(200708)。The future of intrusion prevention。Computer Fraud & Security,2007(8),11-13。  new window
7.Stamford, S.、Hoagland, J. A.、McAlerney, J. M.(2002)。Practical automated detection of stealthy portscans。Journal of Computer Security,10,105-136。  new window
8.Ye, N. Borror、Y. Z. C. M.(2004)。Robustness of the Markov-chain model for cyber-attack detection。IEEE Transactions on Reliability,53,116-123。  new window
9.Barbara, D.、Couto, J.、Jajodia, S.、Wu, N.(2001)。ADAM: a testbed for exploring the use of data mining in intrusion detection。ACM SIGMOD Record: SPECIAL ISSUE: Special section on data mining for intrusion detection and threat analysis,30,15-24。  new window
會議論文
1.Kruegel, C.、Mutz, D.、Robertson, W.、Valeur, F.(2003)。Bayesian event classification for intrusion detection。19th Annual Computer Security Applications Conference。Las Vegas, NV。  new window
2.Axelsson, S.(199812)。Research in intrusion-detection systems: a survey, Department of Computer Engineering, Chalmers98。  new window
3.Wang, W.、Battiti, R.(2006)。Identifying intrusions in computer networks with principal component analysis。Vienna, Austria。270-279。  new window
4.Forrest, S.、Hofmeyr, S. A.、Somayaji, A.、Longstaff, Thomas A.(1996)。A Sense of Self for Unix Processes。1996 IEEE Symposium on Research in Security and Privacy。Oakland, CA。120-128。  new window
圖書
1.Anderson, D.、Lunt, T. F.、Javitz, H.、Tamaru, A.、Valdes, A.(199505)。Detecting Unusual Program Behavior Using the Statistical Component of the Next-generation Intrusion Detection Expert System (NIDES)。CA, USA:Computer Science Laboratory:SRI International:Menlo Park, SRI-CSL-95-06。  new window
2.Erto, L.、Eilertson, E.、Lazarevic, A.、Tan, P. N.、Kumar, V.、Srivastava, J.、Dokas, P.(2004)。he MINDS-Minnesota intrusion detection system in Next Generation Data Mining。Boston:MIT Press。  new window
其他
1.Neil, MacDonald(200701)。Host-Based Intrusion Prevention Systems (HIPS) Update: Why Antivirus and Personal Firewall Technologies Aren’ t Enough,http://www.gartner.com/teleconferences/attributes/attr 165281115 .pdf,。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top