完整後設資料紀錄
DC 欄位語言
dc.contributor.authorTsai, Tsung-Yi
dc.contributor.authorSung, Chia-Ming
dc.contributor.authorTsai, Wen-Nung
dc.date.accessioned2009-08-23T04:42:40Z
dc.date.accessioned2020-05-25T06:53:30Z-
dc.date.available2009-08-23T04:42:40Z
dc.date.available2020-05-25T06:53:30Z-
dc.date.issued2007-01-29T08:16:10Z
dc.date.submitted2006-12-04
dc.identifier.urihttp://dspace.lib.fcu.edu.tw/handle/2377/3594-
dc.description.abstractBased on the system call interception technique, we develop a real-time intrusion prevention system to solve both the collaborative and inherited attacks. This system intercepts every system call invoked by application programs and tries to match any penetration patterns. Once there are evidences showing certain penetration is happening, the system can terminate the penetration process before it hurts the system. To improve detection accuracy, we build an inspection model analogous to the human-immunity concept that traces interactions among processes that constitute a villain family. With the help of these enhancements, our system can solve the collaborative attack problems, and can also select normal-behaved template genes to reduce false positive alarm rate.
dc.description.sponsorship元智大學,中壢市
dc.format.extent6p.
dc.format.extent845846 bytes
dc.format.mimetypeapplication/pdf
dc.language.isozh_TW
dc.relation.ispartofseries2006 ICS會議
dc.subject.otherNetwork and System Security
dc.titleA Study of Intrusion Prevention System against Collaborative and Inherited Attacks
分類:2006年 ICS 國際計算機會議

文件中的檔案:
檔案 描述 大小格式 
ce07ics002006000140.pdf826.02 kBAdobe PDF檢視/開啟


在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。