메뉴 건너뛰기




Volumn 7, Issue 4, 2010, Pages 381-395

Detecting intrusions through system call sequence and argument analysis

Author keywords

anomaly detection; behavior detection; Intrusion detection; Invasive software (viruses; Markov models; Network level security and protection; phreaking); Security; Trojan horses); Unauthorized access (hacking; worms

Indexed keywords

CLUSTERING ALGORITHMS; COMPUTER VIRUSES; INTRUSION DETECTION; MARKOV PROCESSES; PERSONAL COMPUTING; SIGNAL TO NOISE RATIO; VIRUSES;

EID: 78149460823     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2008.69     Document Type: Article
Times cited : (122)

References (47)
  • 1
    • 0004048154 scopus 로고
    • Computer security threat monitoring and surveillance
    • J. P, Anderson, Apr
    • J. P. Anderson, "Computer Security Threat Monitoring and Surveillance", technical report, J. P. Anderson, Apr. 1980.
    • (1980) Technical Report
    • Anderson, J.P.1
  • 3
    • 0142222738 scopus 로고    scopus 로고
    • Detection and classification of intrusion and faults using sequences of system calls
    • J. B. D. Cabrera, L. Lewis, and R. Mehara, "Detection and Classification of Intrusion and Faults Using Sequences of System Calls", ACM SIGMOD Record, vol. 30, no. 4, 2001.
    • (2001) ACM SIGMOD Record , vol.30 , Issue.4
    • Cabrera, J.B.D.1    Lewis, L.2    Mehara, R.3
  • 4
    • 0032313923 scopus 로고    scopus 로고
    • Intrusion detection using sequences of system calls
    • S. Hofmeyr, S. Forrest, and A. Somayaji, "Intrusion Detection Using Sequences of System Calls", J. Computer Security, vol. 6, pp. 151-180, 1998.
    • (1998) J. Computer Security , vol.6 , pp. 151-180
    • Hofmeyr, S.1    Forrest, S.2    Somayaji, A.3
  • 6
    • 85149612939 scopus 로고
    • Fast effective rule induction
    • A. Prieditis and S. Russell, eds., July
    • W. W. Cohen, "Fast Effective Rule Induction", Proc. 12th Int'l Conf. Machine Learning (ICML'95), A. Prieditis and S. Russell, eds., pp. 115-123, July 1995.
    • (1995) Proc. 12th Int'l Conf. Machine Learning (ICML'95) , pp. 115-123
    • Cohen, W.W.1
  • 10
    • 84882800335 scopus 로고    scopus 로고
    • Simple, state-based approaches to program-based anomaly detection
    • C. C. Michael and A. Ghosh, "Simple, State-Based Approaches to Program-Based Anomaly Detection", ACM Trans. Information and System Security, vol. 5, no. 3, pp. 203-237, 2002.
    • (2002) ACM Trans. Information and System Security , vol.5 , Issue.3 , pp. 203-237
    • Michael, C.C.1    Ghosh, A.2
  • 14
    • 0037209446 scopus 로고    scopus 로고
    • Host-based intrusion detection using dynamic and static behavioral models
    • Jan
    • D.-Y. Yeung and Y. Ding, "Host-Based Intrusion Detection Using Dynamic and Static Behavioral Models", Pattern Recognition, vol. 36, pp. 229-243, Jan. 2003.
    • (2003) Pattern Recognition , vol.36 , pp. 229-243
    • Yeung, D.-Y.1    Ding, Y.2
  • 19
    • 0023294428 scopus 로고
    • An intrusion-detection model
    • Feb
    • D. E. Denning, "An Intrusion-Detection Model", IEEE Trans. Software Eng., vol. 13, no. 2, pp. 222-232, Feb. 1987.
    • (1987) IEEE Trans. Software Eng. , vol.13 , Issue.2 , pp. 222-232
    • Denning, D.E.1
  • 21
    • 0035271352 scopus 로고    scopus 로고
    • An anomaly detection technique based on a chi-square statistic for detecting intrusions into information systems
    • N. Ye and Q. Chen, "An Anomaly Detection Technique Based on a Chi-Square Statistic for Detecting Intrusions into Information Systems", Quality and Reliability Eng. Int'l, vol. 17, no. 2, pp. 105-112, 2001.
    • (2001) Quality and Reliability Eng. Int'l , vol.17 , Issue.2 , pp. 105-112
    • Ye, N.1    Chen, Q.2
  • 26
    • 0031258214 scopus 로고    scopus 로고
    • Computer immunology
    • S. Forrest, S. A. Hofmeyr, and A. Somayaji, "Computer Immunology", Comm. ACM, vol. 40, no. 10, pp. 88-96, 1997.
    • (1997) Comm. ACM , vol.40 , Issue.10 , pp. 88-96
    • Forrest, S.1    Hofmeyr, S.A.2    Somayaji, A.3
  • 29
    • 0142253851 scopus 로고    scopus 로고
    • Mining system audit data: Opportunities and challenges
    • W. Lee and W. Fan, "Mining System Audit Data: Opportunities and Challenges", ACM SIGMOD Record, vol. 30, no. 4, pp. 35-44, 2001.
    • (2001) ACM SIGMOD Record , vol.30 , Issue.4 , pp. 35-44
    • Lee, W.1    Fan, W.2
  • 38
    • 78149426851 scopus 로고    scopus 로고
    • LibAnomaly
    • LibAnomaly, http://www.cs.ucsb.edu/~rsg/libAnomaly, 2008.
    • (2008)
  • 41
    • 0024610919 scopus 로고
    • A tutorial on hidden Markov models and selected applications in speech recognition
    • L. R. Rabiner, "A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition", Proc. IEEE, vol. 77, pp. 257-286, 1989.
    • (1989) Proc. IEEE , vol.77 , pp. 257-286
    • Rabiner, L.R.1
  • 43
    • 0034301517 scopus 로고    scopus 로고
    • The 1999 DARPA off-line intrusion detection evaluation
    • R. Lippmann, J. W. Haines, D. J. Fried, J. Korba, and K. Das, "The 1999 DARPA Off-Line Intrusion Detection Evaluation", Computer Networks, vol. 34, no. 4, pp. 579-595, 2000.
    • (2000) Computer Networks , vol.34 , Issue.4 , pp. 579-595
    • Lippmann, R.1    Haines, J.W.2    Fried, D.J.3    Korba, J.4    Das, K.5
  • 44
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln laboratory
    • J. McHugh, "Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory", ACM Trans. Information and System Security, vol. 3, no. 4, pp. 262-294, 2000.
    • (2000) ACM Trans. Information and System Security , vol.3 , Issue.4 , pp. 262-294
    • McHugh, J.1
  • 46
    • 78149418482 scopus 로고    scopus 로고
    • Shmoo Group
    • Shmoo Group, Capture the CTF, http://cctf.shmoo.com 2008.
    • (2008) Capture the CTF


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.