首页 | 本学科首页   官方微博 | 高级检索  
     

基于系统调用和齐次Markov链模型的程序行为异常检测
引用本文:田新广,高立志,孙春来,张尔扬.基于系统调用和齐次Markov链模型的程序行为异常检测[J].计算机研究与发展,2007,44(9):1538-1544.
作者姓名:田新广  高立志  孙春来  张尔扬
作者单位:国防科学技术大学电子科学与工程学院 长沙410073北京交通大学计算技术研究所北京100044(田新广),清华大学电子工程系 北京100084北京交通大学计算技术研究所北京100044(高立志),北京交通大学计算技术研究所 北京100044(孙春来),国防科学技术大学电子科学与工程学院 长沙410073(张尔扬)
基金项目:国家高技术研究发展计划(863计划) , 北京首信集团重大科研基金
摘    要:异常检测是目前入侵检测领域研究的热点内容.提出一种新的基于系统调用和Markov链模型的程序行为异常检测方法,该方法利用一阶齐次Markov链对主机系统中特权程序的正常行为进行建模,将Markov链的状态同特权程序运行时所产生的系统调用联系在一起,并引入一个附加状态;Markov链参数的计算中采用了各态历经性假设;在检测阶段,基于状态序列的出现概率对特权程序当前行为的异常程度进行分析,并根据Markov链状态的实际含义和程序行为的特点,提供了两种可选的判决方案.同现有的基于隐Markov模型和基于人工免疫原理的检测方法相比,提出的方法兼顾了计算成本和检测准确度,特别适用于在线检测.该方法已应用于实际入侵检测系统,并表现出良好的检测性能.

关 键 词:入侵检测  Markov链  异常检测  程序行为  系统调用  系统调用  Markov  Chain  链模型  程序行为  异常检测  Models  Homogeneous  System  Calls  Based  Program  Detection  检测性能  表现  检测系统  应用  在线检测  检测准确度  成本  免疫原理  方案
修稿时间:2006-04-27

Anomaly Detection of Program Behaviors Based on System Calls and Homogeneous Markov Chain Models
Tian Xinguang,Gao Lizhi,Sun Chunlai,Zhang Eryang.Anomaly Detection of Program Behaviors Based on System Calls and Homogeneous Markov Chain Models[J].Journal of Computer Research and Development,2007,44(9):1538-1544.
Authors:Tian Xinguang  Gao Lizhi  Sun Chunlai  Zhang Eryang
Affiliation:1School of Electronic Science and Engineering, National University of Defense Technology, Changsha 410073;2. Department of Electronic Engineering, Tsinghua University, Beijing 100084; 3.Institute of Computing Technology, Beijing Jiaotong University, Beijing 100044
Abstract:Anomaly detection is the major direction of research in intrusion detection.Presented in this paper is a new method for anomaly detection of program behaviors,which is applicable to host-based intrusion detection systems using system calls as audit data.The method constructs a one-order homogeneous Markov chain to represent the normal behavior profile of a privileged program,and associates the states of the homogeneous Markov chain with the unique system calls in training data.At the detection stage,the occurrence probabilities of the state sequences of the Markov chain are computed,and two different schemes can be used to determine whether the monitored program's behaviors are normal or anomalous while the particularity of program behaviors is taken into account.The method gives attention to both computational efficiency and detection accuracy.It is less computationally expensive than the method based on hidden Markov models introduced by Warrender et al,and is more applicable to on-line detection.Compared with the methods based on system call sequences presented by Hofmeyr and Forrest,the method in this paper can achieve higher detection accuracy.The study empirically demonstrates the promising performance of the method,and it has succeeded in getting application in practical host-based intrusion detection systems.
Keywords:intrusion detection  Markov chain  anomaly detection  program behavior  system call
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号