网络安全与数据治理2024,Vol.43Issue(12):27-32,6.DOI:10.19358/j.issn.2097-1788.2024.12.004
操作系统行为理论模型及典型应用研究
Research on the theory and typical applications of operating system behavior
祝林 1邬江 1刘克斌 1钟杰1
作者信息
- 1. 中电长城网际安全技术研究院(北京)有限公司,北京 100097
- 折叠
摘要
Abstract
In response to the problem of unknown attacks being"undetectable"and known attacks being"unpredictable"in current terminal network security attacks and defenses,the current"blocking and control"security mechanism can be blocked or avoided by attackers.In order to reverse the passive backwardness of terminal security protection,it is needful to achieve innovative break-throughs in terminal security detection theory,security detection analysis models,and practical applications.This study formalized the behavior of the operating system and designed an operating system behavior analysis model based on the formal definition.Then,buffer overflow attacks and terminal data leakage attacks were used as typical examples to verify the correctness of the method.关键词
行为测量/操作系统行为/安全检测/终端防护Key words
behavior measurement/operating system behavior/security testing/terminal protection分类
信息技术与安全科学引用本文复制引用
祝林,邬江,刘克斌,钟杰..操作系统行为理论模型及典型应用研究[J].网络安全与数据治理,2024,43(12):27-32,6.