完整後設資料紀錄
DC 欄位語言
dc.contributor.authorTsai, Tsung-Yi
dc.contributor.authorCheng, Kuang-Hung
dc.contributor.authorChen, Chi-Hung
dc.contributor.authorTsai, Wen-Nung
dc.date.accessioned2009-06-02T06:38:30Z
dc.date.accessioned2020-05-25T06:43:50Z-
dc.date.available2009-06-02T06:38:30Z
dc.date.available2020-05-25T06:43:50Z-
dc.date.issued2006-10-16T03:32:52Z
dc.date.submitted2004-11-15
dc.identifier.urihttp://dspace.lib.fcu.edu.tw/handle/2377/1438-
dc.description.abstractOver the past several years, the Internet environment has become more complex and untrusted. There are always crackers and business competitors trying to penetrate security system and then steal confidential information. Some of them would also spread malicious software or files attack our computer system, making our system paralyzed, unable to provide service. Even more, the attacker may gain full access to our system without any trace. Based on the system call interception technique, we developed a real-time intrusion prevention system, IPSW (Intrusion Prevention System using Wrapper). This system intercepts every system call invoked by applications and tries to match any of the penetration scenarios. Once there is any evidence showing some penetration being undertaken, the system can terminate the penetration process before it gets injured. This wrapper system can also wrap Commercial Off-The-Shelf (COTS) software components to provide robustness and security.
dc.description.sponsorship大同大學,台北市
dc.format.extent6p.
dc.format.extent849223 bytes
dc.format.mimetypeapplication/pdf
dc.language.isozh_TW
dc.relation.ispartofseries2004 ICS會議
dc.subjectIDS
dc.subjectIPS
dc.subjectSystem call Interception
dc.subjectVirus
dc.subjectWrapper
dc.subject.otherInformation Security
dc.titleAn Intrusion Prevention System using Wrapper
分類:2004年 ICS 國際計算機會議

文件中的檔案:
檔案 描述 大小格式 
ce07ics002004000211.pdf829.32 kBAdobe PDF檢視/開啟


在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。