Host-based intrusion detection system: Model and design features

被引:1
作者
Zegzhda, Pyotr [1 ]
Kort, Sernyon [1 ]
机构
[1] St Petersburg Polytechn Univ, St Petersburg, Russia
来源
COMPUTER NETWORK SECURITY, PROCEEDINGS | 2007年 / 1卷
关键词
intrusion detection; host-based intrusion detection system; attack; API Intercept;
D O I
10.1007/978-3-540-73986-9_29
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article reports on a model of a host-based intrusion detection system. Using a model of a state machine possible mechanisms of security violations in a computer system are analyzed. Thereafter principles are suggested for building an analysis module based on a model of dynamic monitoring of system statuses. The article concludes with a number of approaches for developing a data acquisition module for a host-based intrusion detection system.
引用
收藏
页码:340 / +
页数:2
相关论文
共 50 条
[41]   Design of Intrusion Detection Model Based on Data Mining Technology [J].
Li Yin-huan .
2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE), 2012, :571-574
[42]   Design of a distributed intrusion detection system based on independent agents [J].
Du, Y ;
Wang, HQ ;
Pang, YG .
PROCEEDINGS OF INTERNATIONAL CONFERENCE ON INTELLIGENT SENSING AND INFORMATION PROCESSING, 2004, :254-257
[43]   Design of Intrusion Detection System Based on Data Mining Algorithm [J].
Song, Changxin ;
Ma, Ke .
PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING SYSTEMS, 2009, :370-373
[44]   Design of data mining-based intrusion detection system [J].
Su, MD ;
Liu, DQ ;
Li, YF .
ICEMI 2005: Conference Proceedings of the Seventh International Conference on Electronic Measurement & Instruments, Vol 2, 2005, :93-95
[45]   Design of the Computer Intrusion Detection System [J].
Liu, Hui .
PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION, INFORMATION AND CONTROL, 2015, 125 :747-751
[46]   An Enhanced Intrusion Detection System Based on Clustering [J].
Borah, Samarjeet ;
Panigrahi, Ranjit ;
Chakraborty, Anindita .
PROGRESS IN ADVANCED COMPUTING AND INTELLIGENT ENGINEERING, VOL 2, 2018, 564 :37-45
[47]   State analysis based on the agreement of the Intrusion Detection System Model [J].
Xing, Wenjian ;
Zhang, Jing ;
Li, Tonglei .
ICMS2010: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON MODELLING AND SIMULATION, VOL 6: MODELLING & SIMULATION INDUSTRIAL ENGINEERING & MANAGEMENT, 2010, :177-180
[48]   Research on Immune based Adaptive Intrusion Detection System Model [J].
Deng, Lei ;
Gao, De-yuan .
NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, :488-491
[49]   Intrusion Detection Model Based on Hierarchical Fuzzy Inference System [J].
Zhou, Yu-Ping ;
Fang, Jian-An ;
Zhou, Yu-Ping .
ICIC 2009: SECOND INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTING SCIENCE, VOL 2, PROCEEDINGS: IMAGE ANALYSIS, INFORMATION AND SIGNAL PROCESSING, 2009, :144-+
[50]   Research on Intrusion Detection System Model Based on Data Mining [J].
Zhu Limiao ;
Huang Hua ;
Zheng Hao .
2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, :113-116