1) read system call
读入系统调用
2) write system call
写入系统调用
3) input buffered line system call
输入缓冲行系统调用
4) system call
系统调用
1.
The new method of the state-transition detection based on sequences of system calls;
基于系统调用序列的状态转换检测新方法
2.
Markov chain intrusion detection model based on system call macro;
基于系统调用宏的马尔可夫链入侵检测模型
3.
Research on system call sequence audit based on genetic algorithm;
基于遗传算法的系统调用序列审计研究
5) system calls
系统调用
1.
When an intrusion actually occurs,it generates a number of abnormal system calls,and as a result,the neighboring sequences of system calls will not match the normal sequences.
HMM用来检测一个系统调用短序列是否异常,根据异常系统调用短序列占该进程所有短序列的百分比来判断该进程是否是入侵。
2.
This paper has researched method of constructing detector in computer immune system based on system calls, enhanced veracity of detector by improving replacement algorithm of circulation sequence, and has optimized recognition rules by genetic algorithms.
本文研究了基于系统调用的计算机免疫系统中检测器的构造方法,通过改进循环序列的置换算法来处理嵌套循环序列,以提高检测器的准确度,并使用遗传算法优化了检测器规则库。
3.
At the moment there are a lot of vicious LKMs,most of them modify Linux system calls.
目前存在大量的恶意LKM(Loaded Kernel Module),其中大部分都是修改Linux系统调用的。
6) system-call
系统调用
1.
Analysis and research of system-call mechanism in embedded Linux system;
嵌入式Linux系统中系统调用机制的分析与研究
2.
Design of an Intrusion Detection Model Under Linux Based on System-call Monitoring;
基于系统调用监控的Linux入侵检测模型设计
3.
PH monitors every executing process on a computer at the system-call level,and responds to anomalies by either delaying or aborting system calls.
对入侵的自动反应是当前计算机社会一个未解决的重要问题,一个称为PH(processhomeostasis)的系统能在目标系统受到危害之前成功地检测并阻止入侵,PH在系统调用的层次上监测计算机上所有活动的进程,并且通过延滞或中断系统调用的方法对异常作出反应。
补充资料:计算机输入/输出控制系统(见计算机输入/输出系统)
计算机输入/输出控制系统(见计算机输入/输出系统)
computer input/output control system
iisuanii shuru/shuehu kongzhi xitong计算机输入/输出控制系统(com-puter inPut/ou中ut eontrol system)见计算机输入/输出系统。
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条