메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Using system call information to reveal hidden attack manifestations

Author keywords

[No Author keywords available]

Indexed keywords

ATTACK MANIFESTATION; DETECTION ALGORITHM; DISTANCE-BASED; INTRUSION DETECTORS; RETURN VALUE; SYSTEM CALLS;

EID: 79851497098     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (7)

References (26)
  • 8
    • 85084160767 scopus 로고    scopus 로고
    • On gray-box program tracking for anomaly detection
    • San Diego, CA, USA, August 9-13, USENIX Association
    • D. Gao, M. K. Reiter, and D. X. Song. On gray-box program tracking for anomaly detection. In USENIX Security Symposium, pages 103-118, San Diego, CA, USA, August 9-13, 2004. USENIX Association.
    • (2004) USENIX Security Symposium , pp. 103-118
    • Gao, D.1    Reiter, M.K.2    Song, D.X.3
  • 11
    • 85084162795 scopus 로고    scopus 로고
    • Detecting manipulated remote call streams
    • San Francisco, CA, USA, August 5-9, USENIX Association
    • J. T. Giffin, S. Jha, and B. P. Miller. Detecting manipulated remote call streams. In Proceedings of the 11th USENIX Security Symposium, pages 61-79, San Francisco, CA, USA, August 5-9, 2002. USENIX Association.
    • (2002) Proceedings of the 11th USENIX Security Symposium , pp. 61-79
    • Giffin, J.T.1    Jha, S.2    Miller, B.P.3
  • 16
    • 85084160262 scopus 로고    scopus 로고
    • Using text categorization techniques for intrusion detection
    • San Francisco, CA, USA, August 5-9, USENIX Association
    • Y. Liao and V. R. Vemuri. Using text categorization techniques for intrusion detection. In Proceedings of the 11th USENIX Security Symposium, pages 51-59, San Francisco, CA, USA, August 5-9, 2002. USENIX Association.
    • (2002) Proceedings of the 11th USENIX Security Symposium , pp. 51-59
    • Liao, Y.1    Vemuri, V.R.2
  • 17
    • 79851505315 scopus 로고    scopus 로고
    • Visited May 15, 2007
    • Add root user to /etc/passwd. http://www.milw0rm.com/exploits/2803. Visited May 15, 2007.
    • Add Root User to /Etc/passwd
  • 21
    • 79851483990 scopus 로고    scopus 로고
    • sorbo Visited May 15, 2007
    • sorbo. Linux traceroute exploit code released. http://www.securiteam.com/ exploits/6A00A1F5QM.html. Visited May 15, 2007.
    • Linux Traceroute Exploit Code Released
  • 23
    • 33745443149 scopus 로고    scopus 로고
    • Learning rules from system call arguments and sequences for anomaly detection
    • Melbourne, FL, USA, November 19
    • G. Tandon and P. Chan. Learning rules from system call arguments and sequences for anomaly detection. In ICDM Workshop on Data Mining for Computer Security (DMSEC), pages 20-29, Melbourne, FL, USA, November 19, 2003.
    • (2003) ICDM Workshop on Data Mining for Computer Security (DMSEC) , pp. 20-29
    • Tandon, G.1    Chan, P.2
  • 24
    • 0038011184 scopus 로고    scopus 로고
    • Mimicry attacks on host-based intrusion detection systems
    • Washington D.C., USA, November 18-22, 2002. ACM
    • D. Wagner and P. Soto. Mimicry attacks on host-based intrusion detection systems. In 9th ACM Conference on Computer and Communications Security (CCS 2002), pages 255-264, Washington D.C., USA, November 18-22, 2002. ACM.
    • 9th ACM Conference on Computer and Communications Security (CCS 2002) , pp. 255-264
    • Wagner, D.1    Soto, P.2
  • 26
    • 79851490034 scopus 로고    scopus 로고
    • Personal communications with
    • Personal communications with Wolfgang John, 2007.
    • (2007)
    • John, W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.