Title: | detecting the deviations of privileged process execution |
Author: | Su PR
; Li DQ
; Qu HP
; Feng DG
|
Source: | Lecture Notes in Computer Science
|
Conference Name: | 4th International Conference on Networking (ICN 2005)
|
Conference Date: | APR 17-21,
|
Issued Date: | 2005
|
Conference Place: | Reunion Isl, FRANCE
|
Keyword: | Computer science
; Computer viruses
; Fuzzy sets
; Mathematical models
; Monitoring
|
Publisher: | NETWORKING - ICN 2005, PT 2
|
Publish Place: | HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
|
Indexed Type: | sci
; istp
; ei
; springer
|
ISSN: | 0302-9743
|
ISBN: | 3-540-25338-6
|
Department: | Chinese Acad Sci, State Key Lab Informat Secur, Inst Software, Beijing 100080, Peoples R China. Chinese Acad Sci, Grad Sch, Beijing 100039, Peoples R China.
|
English Abstract: | Most intruders access system unauthorizedly by exploiting vulnerabilities of privileged processes. Respectively monitoring privileged processes via system call sequences is one of effective methods to detect intrusions. Based on the analysis o |
Language: | 英语
|
Citation statistics: |
|
Content Type: | 会议论文
|
URI: | http://ir.iscas.ac.cn/handle/311060/12620
|
Appears in Collections: | 软件所图书馆_会议论文
|
File Name/ File Size |
Content Type |
Version |
Access |
License |
|
detecting the deviations of privileged process execution.pdf(235KB) | -- | -- | 限制开放 | -- | 联系获取全文 |
|
Recommended Citation: |
Su PR,Li DQ,Qu HP,et al. detecting the deviations of privileged process execution[C]. 见:4th International Conference on Networking (ICN 2005). Reunion Isl, FRANCE. APR 17-21,.
|
|
|