Secure coprocessor-based intrusion detection

作者: Xiaolan Zhang , Leendert van Doorn , Trent Jaeger , Ronald Perez , Reiner Sailer

DOI: 10.1145/1133373.1133423

关键词:

摘要: The goal of an intrusion detection system (IDS) is to recognize attacks such that their exploitation can be prevented. Since computer systems are complex, there a variety places where possible. For example, analysis network traffic may indicate attack in progress [11], compromised daemon detected by its abnormal behavior [14, 12, 5, 10, 15], and subsequent prevented the backdoors stepping stones [16, 17].

参考文章(13)
Vern Paxson, Yin Zhang, Detecting stepping stones usenix security symposium. pp. 13- 13 ,(2000)
Pau-Chen Cheng, Suresh Chari, BlueBox: A Policy-Driven, Host-Based Intrusion Detection System. network and distributed system security symposium. ,(2002)
Eugene H. Spafford, Diego Zamboni, Using internal sensors for computer intrusion detection Purdue University. ,(2001)
Vern Paxson, Bro: a system for detecting network intruders in real-time Computer Networks. ,vol. 31, pp. 2435- 2463 ,(1999) , 10.1016/S1389-1286(99)00112-7
Colin M. Maunder, Rodham Tulloss, The Test Access Port and Boundary Scan Architecture ,(1990)
Sean W Smith, Steve Weingart, Building a high-performance, programmable secure coprocessor Computer Networks. ,vol. 31, pp. 831- 860 ,(1999) , 10.1016/S1389-1286(98)00019-X
Massimo Bernaschi, Emanuele Gabrielli, Luigi V. Mancini, Operating system enhancements to prevent the misuse of system calls computer and communications security. ,vol. 1, pp. 174- 183 ,(2000) , 10.1145/352600.352624
J.G. Dyer, M. Lindemann, R. Perez, R. Sailer, L. van Doorn, S.W. Smith, Building the IBM 4758 secure coprocessor IEEE Computer. ,vol. 34, pp. 57- 66 ,(2001) , 10.1109/2.955100
D. Wagner, R. Dean, Intrusion detection via static analysis ieee symposium on security and privacy. pp. 156- 168 ,(2001) , 10.1109/SECPRI.2001.924296