Microsoft Word - T 田新广.doc

Similar documents
基于词语关联度的查询缩略*

Microsoft Word - 系统建设1.doc

T e = K 1 Φ m I 2 cosθ K 1 Φ m I cosθ 2 1 T 12 e Φ / 13 m I 4 2 Φ m Φ m 14 I 2 Φ m I 2 15 dq0 T e = K 2 ΦI a 2 16

34 7 S R θ Z θ Z R A B C D PTP θ t 0 = θ 0 θ t 0 = 0 θ t 0 = 0 θ t = θ θ t = 0 θ t = 0 θ t V max θ t a max 3 θ t A θ t t 0 t / V max a max A = 3 4 S S

Microsoft Word - A doc

24 26,,,,,,,,, Nsho [7] Nakadokoro [8],,,, 2 (Tradtonal estmaton of mage Jacoban matrx), f(t 1 ) p(t 2 ) : f(t 1 ) = [f 1 (t 1 ), f 2 (t 1 ),, f m (t

Vol.39 No. 8 August 2017 Hyeonwoo Noh [4] boundng box PASCALV VOC PASCAL VOC Ctyscapes bt 8 bt 1 14 bt

SVM [6] PCA+SVM 79.75% 9 FERE FERE. PCA LDA Adaboost SVM 5 1 SVM Moghaddam [6] M (x,y ) x R N y x y {0,1} M f ( x) = y α k( x, x ) + b x k f(x) = 1 x

2 : 237.,. [6 7] (Markov chan Monte Carlo, MCMC). MCMC, [8 9].,,, [0 ].,, : ),,,.,, ; 2),,.,.,. : ),.,,. ; 2),.,,. ; 3), EM, EM,.,, EM, EM. K M,.,. A

SVM OA 1 SVM MLP Tab 1 1 Drug feature data quantization table

中文模板

2 北 京 邮 电 大 学 学 报 第 35 卷 习 一 个 认 知 模 型, 从 而 解 决 在 不 同 特 征 空 间 进 行 知 识 迁 移 的 问 题. 特 征 迁 移 问 题 一 般 被 归 为 直 推 式 迁 移 学 习 [6], 其 定 义 为 : 给 定 源 数 据 空 间 D s

國立台灣大學圖書資訊學系四十週年系慶學術研討會論文格式

Microsoft Word - 5 魏志生.doc

untitled

中文模板

38 張 元 素 歸 經 引 經 理 論 研 究 本 文 以 張 元 素 著 述 為 主 要 材 料, 采 用 上 海 涵 芬 樓 景 印 元 杜 思 敬 濟 生 拔 粹 刊 本 4 ; 醫 學 啟 源 為 任 應 秋 點 校 本, 任 本 以 明 成 化 八 年 刊 本 為 底 本, 旁 校 上

2 3. 1,,,.,., CAD,,,. : 1) :, 1,,. ; 2) :,, ; 3) :,; 4) : Fig. 1 Flowchart of generation and application of 3D2digital2building 2 :.. 3 : 1) :,

Ashdgsahgdh

untitled

~ 10 2 P Y i t = my i t W Y i t 1000 PY i t Y t i W Y i t t i m Y i t t i 15 ~ 49 1 Y Y Y 15 ~ j j t j t = j P i t i = 15 P n i t n Y

~ ~

United Nations ~ ~ % 2010

Microsoft Word - chnInfoPaper6

Microsoft Word - 专论综述1.doc

41 10 Vol. 41, No ACTA AUTOMATICA SINICA October, ,, (Least square support vector machines, LS-SVM)., LS-SVM,,,, ;,,, ;,. DOI,,,,,

* CUSUM EWMA PCA TS79 A DOI /j. issn X Incipient Fault Detection in Papermaking Wa

Microsoft Word 战玉丽C.doc

中文模板

Microsoft Word - A doc

Dan Buettner / /

Microsoft Word - A doc

2 ( 自 然 科 学 版 ) 第 20 卷 波 ). 这 种 压 缩 波 空 气 必 然 有 一 部 分 要 绕 流 到 车 身 两 端 的 环 状 空 间 中, 形 成 与 列 车 运 行 方 向 相 反 的 空 气 流 动. 在 列 车 尾 部, 会 产 生 低 于 大 气 压 的 空 气 流

标题

标题

untitled

PCA+LDA 14 1 PEN mL mL mL 16 DJX-AB DJ X AB DJ2 -YS % PEN

1 引言

Microsoft Word 張嘉玲-_76-83_

(,00);,, (,,00);,,,, (,00) (,, 00;,00),, (00) IPO, IPO,,,, ( ),,,, (Loughran,Rtter,00;Rtter,003), IPO,IPO, (Rtter,003;Jenknson et al.,006),, IPO,, 5%(

Microsoft Word 邢月秀.doc

Microsoft Word - 专论综述1.doc

92

[1] Liu Hongwei,2013, Study on Comprehensive Evaluation of Iron and Steel Enterprises Production System s Basic Capacities, International Asia Confere

: ;,, 0 0, 60, 0 80,, 76 78, (Deregulation),,,, (Open Sky), (ACI),006.%.8%,.7% 008,, 000, ( ), ( )0, / 6, ; 8, ;, ; 7, ; 06, 6, 006 0, ( ) 0,.%; 0 60,

Microsoft Word tb 赵宏宇s-高校教改纵横.doc

MOTC-IOT-103-H1DB001a 臺 灣 港 務 公 司 之 監 督 與 公 司 治 理 績 效 評 估 研 究 (2/2) 著 者 : 謝 幼 屏 吳 榮 貴 朱 金 元 吳 朝 升 孫 儷 芳 王 克 尹 林 玲 煥 張 淑 滿 陳 銓 楊 世 豪 陳 秋 玲

Microsoft Word 定版

untitled

/MPa / kg m - 3 /MPa /MPa 2. 1E ~ 56 ANSYS 6 Hz (a) 一阶垂向弯曲 (b) 一阶侧向弯曲 (c) 一阶扭转 (d) 二阶侧向弯曲 (e) 二阶垂向弯曲 (f) 弯扭组合 2 6 Hz

标题

Fig. 1 1 The sketch for forced lead shear damper mm 45 mm 4 mm 200 mm 25 mm 2 mm mm Table 2 The energy dissip

Microsoft Word - sbs.doc


,,, () 20 80,,,,, ;,, ;,, ;,,,,,,,,, [1 ], :,,,,2 2,,, () (),,,,:,,,,:,,,, :, [2 ] :,,,,,,, : AN NA,,,,,, ( ),:,,: ( F) = (A1 + A2 + A3 + An -

TFP TFP HK TFP Hseh Klenow HK 9 8 TFP Aok TFP Aok 10 TFP TFP TFP TFP TFP HK TFP 1 Y Y CES θ Y 1 TFP HK θ = 1 θ

Journal of Management , Vol. 25, No. 2, IPOs IPOs IPOs IPOs IPOs IPOs IPOs (

by industrial structure evolution from 1952 to 2007 and its influence effect was first acceleration and then deceleration second the effects of indust

240 生 异 性 相 吸 的 异 性 效 应 [6] 虽 然, 心 理 学 基 础 研 [7-8] 究 已 经 证 实 存 在 异 性 相 吸 异 性 相 吸 是 否 存 在 于 名 字 认 知 识 别 尚 无 报 道 本 实 验 选 取 不 同 性 别 的 名 字 作 为 刺 激 材 料, 通

Microsoft PowerPoint - Aqua-Sim.pptx

TI 3 TI TABLE 4 RANDBIN Research of Modern Basic Education

Microsoft Word - 004王皓 doc

填 写 要 求 一 以 word 文 档 格 式 如 实 填 写 各 项 二 表 格 文 本 中 外 文 名 词 第 一 次 出 现 时, 要 写 清 全 称 和 缩 写, 再 次 出 现 时 可 以 使 用 缩 写 三 涉 密 内 容 不 填 写, 有 可 能 涉 密 和 不 宜 大 范 围 公

:,; ;, ( ) 25,, 80 90, 90,,,,,,, ( ), ( ), %,, , ,, ( ),,, ;,,,,,,,,,, ( ) , , 3395,3400, 20 % 30 %,

报 告 1: 郑 斌 教 授, 美 国 俄 克 拉 荷 马 大 学 医 学 图 像 特 征 分 析 与 癌 症 风 险 评 估 方 法 摘 要 : 准 确 的 评 估 癌 症 近 期 发 病 风 险 和 预 后 或 者 治 疗 效 果 是 发 展 和 建 立 精 准 医 学 的 一 个 重 要 前


; 4,, 1, :,,? (3) : ( ) ; (4) GBK 18000,, ( ) : (2) 2 ; 1 (1) (1987:p ) 2 (1944:p119)

Mechanical Science and Technology for Aerospace Engineering October Vol No. 10 Web SaaS B /S Web2. 0 Web2. 0 TP315 A

% GIS / / Fig. 1 Characteristics of flood disaster variation in suburbs of Shang

<D2BDC1C6BDA1BFB5CDB6C8DAD7CAB8DFB7E5C2DBCCB3B2CEBBE1C3FBB5A52E786C7378>

14-1-人文封面

Microsoft Word doc

招商核心价值混合型证券投资基金托管协议.doc

Microsoft Word - 1--齐继峰_new_.doc

Ansys /4 Ansys % 9 60% MU10 M m 1 Fig. Actual situation of measured building 1 Fig. 1 First floor plan of typical r

Vol. 22 No. 4 JOURNAL OF HARBIN UNIVERSITY OF SCIENCE AND TECHNOLOGY Aug GPS,,, : km, 2. 51, , ; ; ; ; DOI: 10.

穨17.PDF

作为市场化的人口流动

168 健 等 木醋对几种小浆果扦插繁殖的影响 第1期 the view of the comprehensive rooting quality, spraying wood vinegar can change rooting situation, and the optimal concent

國立臺南大學數位論文典藏.pdf


g 100mv /g 0. 5 ~ 5kHz 1 YSV8116 DASP 1 N 2. 2 [ M] { x } + [ C] { x } + [ K]{ x } = { f t } 1 M C K 3 M C K f t x t 1 [ H( ω )] = - ω 2

Shanghai International Studies University THE STUDY AND PRACTICE OF SITUATIONAL LANGUAGE TEACHING OF ADVERB AT BEGINNING AND INTERMEDIATE LEVEL A Thes

OncidiumGower Ramsey ) 2 1(CK1) 2(CK2) 1(T1) 2(T2) ( ) CK1 43 (A 44.2 ) CK2 66 (A 48.5 ) T1 40 (

132 包 装 工 程 2016 年 5 月 网 产 品 生 命 周 期 是 否 有 与 传 统 产 品 生 命 周 期 曲 线 相 关 的 类 似 趋 势 旨 在 抛 砖 引 玉, 引 起 大 家 对 相 关 问 题 的 重 视, 并 为 进 一 步 研 究 处 于 不 同 阶 段 的 互 联 网

4 115,,. : p { ( x ( t), y ( t) ) x R m, y R n, t = 1,2,, p} (1),, x ( t), y ( t),,: F : R m R n.,m, n, u.,, Sigmoid. :,f Sigmoid,f ( x) = ^y k ( t) =

11 25 stable state. These conclusions were basically consistent with the analysis results of the multi - stage landslide in loess area with the Monte

698 39,., [6].,,,, : 1) ; 2) ,, 14,, [7].,,,,, : 1) :,. 2) :,,, 3) :,,,., [8].,. 1.,,,, ,,,. : 1) :,, 2) :,, 200, s, ) :,.

Journal of Chinese Literature of Providence University Vol. 6, Dec 2014 pp Chinese Literature Department, Providence University The analyses

标题

桂医大研〔2015〕10号

44 深 圳 信 息 职 业 技 术 学 院 学 报 第 10 卷 业 实 际 进 出 口 单 证 样 本 的 演 示 与 讲 解, 导 致 学 生 在 学 校 看 到 的 都 是 过 时 的 单 据 演 练 的 陈 旧 的 工 作 流 程, 走 上 工 作 岗 位 后, 一 旦 遇 到 实 际 问

科 研 信 息 化 技 术 与 应 用,2015, 6 (1) of identity and the framework of identity management, this paper analyses the development trend of Identity Management

Microsoft Word - A _ doc

F3

Microsoft Word - 05張政偉

y 1 = 槡 P 1 1h T 1 1f 1 s 1 + 槡 P 1 2g T 1 2 interference 2f 2 s y 2 = 槡 P 2 2h T 2 2f 2 s 2 + 槡 P 2 1g T 2 1 interference 1f 1 s + n n

穨75.PDF

Applied Mathematics and Mechanics Vol. 34 No. 9 Sep ISSN GPU Boltzmann *? GPU Boltz

Microsoft PowerPoint ARIS_Platform_en.ppt

Transcription:

ISSN 1673-9418 CODEN JKYTA8 E-mal: fcst@publc2.bta.net.cn Journal of Fronters of Computer Scence and Technology http://www.ceaj.org 1673-9418/2010/04(06)-0500-11 Tel: +86-10-51616056 DOI: 10.3778/j.ssn.1673-9418.2010.06.002 Unx Lnux * 1+, 1, 2, 洣 1, 1 1., 100190 2., 100037 Masquerade Detecton towards Network Users on Unx and Lnux Platforms * TIAN Xnguang 1+, CHENG Xueq 1, CHEN Xaojuan 2, DUAN My 1, XU Hongbo 1 1. Key Lab of Network Scence and Technology, Insttute of Computng Technology, CAS, Bejng 100190, Chna 2. College of Comp. and Info. Engneerng, Bejng Technology and Busness Unversty, Bejng 100037, Chna + Correspondng author: E-mal: tanxnguang@163.com TIAN Xnguang, CHENG Xueq, CHEN Xaojuan, et al. Masquerade detecton towards network users on Unx and Lnux platforms. Journal of Fronters of Computer Scence and Technology, 2010, 4(6): 500-510. Abstract: Host-based ntruson detecton acts as one of the major drectons of research n network securty. Ths paper presents a novel method for masquerade detecton based on data mnng and varable-length shell command sequence matchng, whch s applcable to ntruson detecton systems usng shell commands as audt data on Unx and Lnux platforms. The method employs multple command sequences to represent user behavor pattern, and utlzes sequence supports defned n data mnng technque to characterze the normal behavor profles of legtmate users. In the detecton stage, a model based on varable-length shell command sequence matchng and decson value weghng s used to dstngush between legtmate users and masqueraders, whle the partcularty of audt data and user behavor s taken nto account. The performance of the method s tested by computer smulaton, and the results show t can acheve hgher detecton accuracy and effcency than exstng alternatve methods. Key words: masquerade attack; ntruson detecton; shell command; data mnng; anomaly detecton *The Natonal Hgh-Tech Research and Development Plan of Chna under Grant No.2006AA01Z452 ( (863)); the Natonal Informaton Securty 242 Program of Chna under Grant No.2005C39( 242 ). Receved 2009-08, Accepted 2010-04.

Unx Lnux 501, Unx Lnux shell shell, ;,,,,,,, ; ; shell ; ; A TP393 1 [1 2], [3 4],,, [5], ;,,,, ;, Markov (hdden Markov model, HMM) Lane T HMM [6], HMM, Baum-Welch HMM,, Chaoj V Szymansk B K [7 8] Schonlau M [9], AT&T Shannon shell Maxon R A Schonlau M [10],,, Imsand E (graphcal user nterface, GUI) [11] Tan X G Markov [1],,, Unx Lnux shell,,, ;

502 Journal of Fronters of Computer Scence and Technology 2010, 4(6),,,,, 2 ( ),, (,, ),,,,, [12 13] (), ;, ( ), [14 16], ; Unx Lnux, shell,, shell [6 10] [1,6,9 10], Unx Lnux shell, shell, [9 10], shell, ; [1,6], shell, shell,,,, 3 (), (1) shell W, W shell, ;,, shell ;, [6,10] shell ; shell ( ),

Unx Lnux 503, W l(1), l(2),, l(w), l() shell (1 W), l(1)<l(2)< < l(w) W, l() W=3, 3 1 2 3, 1 3 5, (2), W shell R = ( s1, s2,, s r ), shell shell ( r), s j j shell R, W l(1), l(2),, l(w) shell, S 1, S 2,, S W R W shell, S l()(1 W) shell, r l() + 1 shell ; 1 2 S = ( S, S,, Sr l() + 1), S j = (s j, s j+1,, s j l() 1 ) +, S j shell s j l() (1 j r l() + 1) (3) S shell S ( 1 W) l() shell S + shell S S S (1 W), support( S + ) = number( S+ ) r l() + 1 number( S + ) S + S r l() + 1 shell, support( S + ) S + S support( S + ) S + S (4) W, W shell ( ) W shell, W mnsup(1), mnsup(2),, mnsup(w), mnsup() shell S l() (1 W), mnsup(1) mnsup(2) mnsup(w), 1 W, S mnsup() shell, L() S mnsup() K(), S 1+, 2+ S,, S K ()+ ( K() r l() + 1), L()={ S 1+, S 2+,, S K ()+ } (5),, L W L(1), L(2),, L(W), L={L(1), L(2),, L(W)},, L L(),,,,, shell ( ) R% = ( s% 1, s% 2,, s % r % ), s% j j shell, r% R % shell ; S % R % l() shell ( S % r% l() + 1), shell S +

504 Journal of Fronters of Computer Scence and Technology 2010, 4(6) shell S % support_ add ( S + ), S + ( S S % ) support_ sum ( S + ) support_ sum ( S + ) = support ( S + ) r l() + 1 +support_ add ( S r+ r% + ) 2() l + 2 r% l() + 1 r+ r% 2() l + 2 (1) shell ( ), ( ),,,,, ;,,, [17], 4, shell, shell ; shell R = ( s1, s2,, s r ), s j j shell, r (), R shell,, (), (1) R = ( s1, s2,, sr ) l(w)-1 shell shell s k ( l(w) k r ), s k W l (1),(2) l,, lw ( ) shell W S, 1 k 2 S k,, S k W, Sk l () shell (1 W), S k =( sk l() + 1, sk l() + 2,, s k ), shell, ; shell,, (2) R = ( s1, s 2,, sr ) shell R = ( s1, s2,, sr ) k shell s k ( l(w) k r ) 1 : = W 2 > 0, = 0, shell s k Sm( s k ): = 0, (, Sm( sk ) shell s k ) 3 l () shell S L () ={ S 1+, S 2+,, S K ()+ } k, S L (), shell s k Sm( s k ): = f (()) l, ; Sk L (), 4 : = 1( 1), 2 s k W shell S,,, 1 k 2 S k k

Unx Lnux 505 W S k, W 1 ( k ), S L() k, S L(), shell s k Sm( sk ): = f ( l( )) ; S k 1 2 W, S k,, Sk L={ L (1), L (2),,L(W)}, Sm( s k ): = 0 Sm( sk ) shell s k ( shell sk ), 3 f (()) l l () f (()) l ( ), l () (), f (()) l = l () lw ( ), f (()) l l (), f (()) l 1(, f (()) l ) R = ( s, s,, s ) shell 1 2 r, ( Sm( s lw ( )), Sm( s + ),, Sm( s )) lw ( ) 1 r (3),,,, ( Sm( s lw ( )), Sm( s lw ( ) + 1),, Sm( s r )) k 1 D( k) = Sm( s ) (2) e = k e + 1, D(k) shell s k, e, e+ l(w) 1 k r, k 1 R = ( s1, s2,, sr ) e+ l(w) 1 shell shell (4) D(k), D(k) a D(k) a, ; D(k) a, ( ), s k, s k e shell sk e + 1, sk e + 2,, k s, (), shell,,, e+l(w) 2 shell, shell, shell W ( )shell,, ( ), (1) W shell R = ( s1, s2,, s r ), W l (1), l (2),, lw ( ) shell, S 1 2 W, S,, S R l (1), l (2),, lw ( ) W shell, S l ()(1 W ) shell ; l () l ()+1 S = ( S, S,, S r ), S j = ( s j l() + 1, s +, s ), j l() 2, j S j shell s j l () ( l ( ) j r ) S r l() + 1 shell (2) W shell 1 W, shell S =

506 Journal of Fronters of Computer Scence and Technology 2010, 4(6) l () l ()+1 r ( S, S,, S ) shell j j l () + 1 j l () + 2 S = ( s, s,, s ) L () ={ S 1+, S 2+,, S K ()+ }, S j L () ( S j L ()), S j j, class( S )=1 S L () ( class( S j j j S j L ()),, S j )=0, shell S = ( Sl (), Sl ()+1,, S r ), (class( S l ()), class( S l ()+1),, class( S )) (3) shell S, (class( S l ()), class( S l ()+1),, class( S r )), j 1 D ( j) = class( S ) (3) e n = j e + 1, e, D ( j) shell S j, e +() l 1 j r D ( j) j S e shell shell S = ( S (), S ()+1, n r l l, Sr ) e+ l () 1 W shell S 1 2 W, S,, S, D 1 ( j ), 2 W D ( j ),, D ( j ), j 1, W D( j) = q( ) D ( j) (4) = 1, q() D (j), q (1) + q (2) + + qw ( ) =1 j e +( lw) 1 j 1, (4) D(j), D(j) a D(j) a,,, ( ), (), R = ( s1, s2,, sr ), ;,,,, 5, W l() mnsup(),,,, W l(), ;, mnsup(), L(), ( ), ( ) [9] a,,,

Unx Lnux 507,, 6 Purdue AT&T Shannon Purdue 8 Unx ( [6][1]); 4 user1 user2 user3 user4, user2, user1 user3 user4 shell 15 000, user2 10 000, 5 000 W = 3, L (1) = 1, L (2) = 2, L (3) = 3, mnsup(1)= 0.000 3, mnsup(2)= 0.000 2, mnsup(3) =0.000 1, e=91; a=0.65 1 Purdue D(k), user2, user1 user3 user4, Fg.1 The plot of D(k) for Purdue Unversty data 1 Purdue, Purdue shell [1] Markov [3] [6](), 1 Purdue shell Table 1 Expermental results of Purdue Unversty data 1 Purdue [1] [3] [6] /(%) /(%) /s 0.02 92.39 412 0.04 92.51 403 0.12 86.52 469 0.18 86.74 512 0.08 89.91 3152 1, ( ), [1,3,6] 1,,,, [3,6], [1,3,6] AT&T Shannon shell ([9][10]), 4 user1 user2 user3 user4, 5 000 shell, user4, 4 000,

508 Journal of Fronters of Computer Scence and Technology 2010, 4(6) 1 000 ; 3, 5 000 shell W=3, L (1) = 1, L (2) = 2, L (3) = 3, mnsup(1)=0.015, mnsup(2)= 0.007 5, mnsup(3) =0.000 75, 1 1,,, ROC 2 AT&T Shannon, [1,3,6] ROC, [1,3,6], Fg.2 The ROC curves for the alternatve methods 2 ROC,,, ;,, 7, Unx Lnux,, ;, ; shell,,, References: [1] Tan Xnguang, Duan My, L Wenfa, et al. Anomaly detecton of user behavor based on shell commands and homogeneous Markov chans[j]. Chnese Journal of Electroncs, 2008, 17(2): 231 236. [2] Tan Xnguang, Duan My, Sun Chunla, et al. Intruson detecton based on system calls and homogeneous Markov chans[j]. Journal of Systems Engneerng and Electroncs, 2008, 19(3): 598 605. [3] Km H S, Cha S D. Emprcal evaluaton of SVM-based masquerade detecton usng UNIX commands[j]. Computers and Securty, 2005, 24(2): 160 168. [4] Gao D, Reter M K, Song D. Behavoral dstance measurement usng hdden Markov models[c]//proceedngs of the Conference on Recent Advanced n Intruson Detecton, Hamburg, Germany, Sep, 2006: 19 40. [5] Mukkamala S, Sung A H, Abraham A. Intruson detecton usng an ensemble of ntellgent paradgms[j]. Journal of Network and Computer Applcaton, 2005, 28(2): 167 182. [6] Lane T, Carla E B. An emprcal study of two approaches to sequence learnng for anomaly detecton[j]. Machne Learnng, 2003, 51(1): 73 107. [7] Chaoj V, Hoonlor A, Szymansk B K. Recursve data mnng for author and role dentfcaton[c]//proceedngs of the 3rd Annual Informaton Assurance Workshop ASIA 08, Albany, NY, June, 2008: 53 62. [8] Szymansk B K, Zhang Y Q. Recursve data mnng for masquerade detecton and author dentfcaton[c]//pro-

Unx Lnux 509 ceedngs of the 5th IEEE System, Man and Cybernetcs Informaton Assurance Workshop, West Pont, NY, June, 2004: 424 431. [9] Schonlau M, Mouchel W. Computer ntruson: Detectng masquerades[j]. Statstcal Scence, 2001, 16(1): 58 74. [10] Maxon R A, Townsend T N. Masquerade detecton usng truncated command lnes[c]//proceedngs of the Internatonal Conference on Dependable Systems and Networks, Washngton, DC, USA, 2002: 219 228. [11] Imsand E, Hamlton J. GUI usage analyss for masquerade detecton[c]//proceedngs of the IEEE Workshop on Informaton Assurance, West Pont, NY, USA, June 20 22, 2007: 270 276. [12] Tan Xnguang, Su Jnguo, L Xuechun. A system and ts method for anomaly detecton of user behavor based on machne learnng: Chnese, ZL200510056934[P]. 2005-03-23. [13] Chen You, Shen Huawe, L Yang, et al. An effcent feature selecton algorthm towards buldng lghtweght ntruson detecton system[j]. Chnese Journal of Computers, 2007,30(8): 1398 1408. [14] Tan Xnguang, Gao Lzh, Sun Chunla, et al. A method for anomaly detecton of user behavors based on machne learnng[j]. The Journal of Chna Unverstes of Post and Telecommuncatons, 2006, 13(2): 61 65. [15] Tan Xnguang, Gao Lzh, Sun Chunla, et al. Anomaly detecton of program behavor based on system calls and Markov chans[j]. Journal of Computer Research and Development, 2007, 44(9): 1538 1544. [16] Ye N, Emran S M, Chen Q. Multvarate statstcal analyss of audt trals for host-based ntruson detecton[j]. IEEE Transactons on Computers, 2002, 51(7): 810 820. [17] Yan Qao, Xe Wexn, Yang Bn. An anomaly ntruson detecton method based on HMM[J]. Electroncs Letters, 2002, 38(13): 663 664. 附中文参考文献 : [12],,. :, ZL200510056934[P]. 2005-03-23. [13],,,. [J]., 2007, 30(8): 1398 1408. [15],,,. Markov [J]., 2007, 44(9): 1538 1544. TIAN Xnguang was born n 1976. He receved hs B.S., M.S. and Ph.D. degrees n Informaton and Communcaton Engneerng from Natonal Unversty of Defense Technology n 1998, 2001 and 2005 respectvely. He s currently a post-doctoral fellow at Insttute of Computng Technology, Chnese Academy of Scences, and s the senor member of CCF. Hs current research nterests nclude network securty, ntruson detecton and nformaton processng, etc. (1976 ),,, 1998 2001 2005,, ( ),,, 80, 8, CHENG Xueq was born n 1971. He receved hs Ph.D. degree n Computer Archtecture from Insttute of Computng Technology, Chnese Academy of Scences. He s currently a researcher and doctoral supervsor at Insttute of Computng Technology, Chnese Academy of Scences. Hs research nterests nclude network and nformaton securty, P2P computng, etc. (1971 ),,,,,,, P2P

510 Journal of Fronters of Computer Scence and Technology 2010, 4(6) CHEN Xaojuan was born n 1977. She receved her B.S. and M.S. degrees n Electronc Scence and Engneerng from Natonal Unversty of Defense Technology n 1998 and 2005 respectvely. She s currently a laboratory assstant at College of Computer and Informaton Engneerng, Bejng Technology and Busness Unversty. Her current research nterests nclude communcaton engneerng and dgtal sgnal processng, etc. (1977 ),,, 1998 2005,,, DUAN My was born n 1953. He receved hs Ph.D. degree n Computer Scence from Magdeburg Unversty, Germany, n 1995. He s now a researcher and Ph.D. supervsor at Insttute of Computng Technology, Chnese Academy of Scences, and the councl member of CCF. Hs research nterests nclude computer network and ntruson detecton, etc. 洣 (1953 ),,, 1995,, XU Hongbo was born n 1975. He receved hs Ph.D. degree from Insttute of Computng Technology, Chnese Academy of Scences. He s now an assocate researcher at Insttute of Computng Technology, Chnese Academy of Scences. Hs research nterests nclude nformaton retreval, text mnng and natural language processng, etc. (1975 ),,, 2003,,,