메뉴 건너뛰기




Volumn , Issue , 2013, Pages 431-440

A host-based anomaly detection approach by representing system calls as states of kernel modules

Author keywords

Host based Intrusion Detection System; Software Reliability; Software Security

Indexed keywords

ANOMALY DETECTION; ANOMALY INTRUSION DETECTION; FALSE ALARM RATE; HOST-BASED INTRUSION DETECTION SYSTEM; INFORMED DECISION; PROCESSING TIME; SEMANTIC INTERACTIONS; SOFTWARE SECURITY;

EID: 84893264720     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISSRE.2013.6698896     Document Type: Conference Paper
Times cited : (50)

References (38)
  • 2
    • 76549120185 scopus 로고    scopus 로고
    • Host based intrusion detection using RBF neural networks
    • Islamaabad, Pakistan
    • U. Ahmed and A. Masood, "Host based intrusion detection using RBF neural networks", in Int. Conf. on Emerging Technologies, ICET 2009, Islamaabad, Pakistan, 2009, pp. 48-51.
    • (2009) Int. Conf. on Emerging Technologies, ICET 2009 , pp. 48-51
    • Ahmed, U.1    Masood, A.2
  • 4
    • 0037282635 scopus 로고    scopus 로고
    • Efficient anomaly detection by modeling privilege flows using hidden Markov model
    • Jan.
    • S. B. Cho and H. J. Park, "Efficient anomaly detection by modeling privilege flows using hidden Markov model", Computers and Security, vol. 22, no. 1, pp. 45-55, Jan. 2003.
    • (2003) Computers and Security , vol.22 , Issue.1 , pp. 45-55
    • Cho, S.B.1    Park, H.J.2
  • 5
    • 84881102082 scopus 로고    scopus 로고
    • A semantic approach to hostbased intrusion detection systems using contiguous and discontiguous system call patterns
    • G. Creech and J. Hu, "A Semantic Approach to Hostbased Intrusion Detection Systems Using Contiguous and Discontiguous System Call Patterns", IEEE Transactions on Computers, vol. PP, no. 99, pp. 1-1, 2013.
    • (2013) IEEE Transactions on Computers , vol.PP , Issue.99 , pp. 1-1
    • Creech, G.1    Hu, J.2
  • 11
    • 27144523481 scopus 로고    scopus 로고
    • Measuring various properties of execution traces to help build better trace analysis tools
    • China
    • A. Hamou-Lhadj and T. Lethbridge, "Measuring Various Properties of Execution Traces to Help Build Better Trace Analysis Tools", in Proc. of 10th Conf. on Eng. of Complex Comp. Sys., China, 2005, pp. 559-568.
    • (2005) Proc. of 10th Conf. on Eng. of Complex Comp. Sys. , pp. 559-568
    • Hamou-Lhadj, A.1    Lethbridge, T.2
  • 12
    • 84890861404 scopus 로고    scopus 로고
    • A multi-layer model for anomaly intrusion detection using program sequences of system calls
    • Sep.
    • X. D. Hoang, Jiankun Hu, and P. Bertok, "A multi-layer model for anomaly intrusion detection using program sequences of system calls", in 11th IEEE Conf. on Network, Sep. 2003, pp. 531-536.
    • (2003) 11th IEEE Conf. on Network , pp. 531-536
    • Hoang, X.D.1    Hu, J.2    Bertok, P.3
  • 13
    • 68949196337 scopus 로고    scopus 로고
    • A programbased anomaly intrusion detection scheme using multiple detection engines and fuzzy inference
    • Nov.
    • X. D. Hoang, J. Hu, and and P. Bertok., "A programbased anomaly intrusion detection scheme using multiple detection engines and fuzzy inference", J. Netw. Comput. Appl, vol. 32, no. 6, pp. 1219-1228, Nov. 2009.
    • (2009) J. Netw. Comput. Appl , vol.32 , Issue.6 , pp. 1219-1228
    • Hoang, X.D.1    Hu, J.2    Bertok, A.P.3
  • 14
    • 0032313923 scopus 로고    scopus 로고
    • Intrusion detection using sequences of system calls
    • Aug.
    • S. A. Hofmeyr, S. Forrest, and and A. Somayaji, "Intrusion detection using sequences of system calls", J. Comput. Security, vol. 6, no. 3, pp. 151-180, Aug. 1998.
    • (1998) J. Comput. Security , vol.6 , Issue.3 , pp. 151-180
    • Hofmeyr, S.A.1    Forrest, S.2    Somayaji, A.A.3
  • 15
    • 65249107163 scopus 로고    scopus 로고
    • A simple and efficient hidden Markov model scheme for hostbased anomaly intrusion detection
    • Jan.
    • J. Hu, X. Yu, D. Qiu, and and H. H. Chen, "A simple and efficient hidden Markov model scheme for hostbased anomaly intrusion detection", IEEE Network, vol. 23, no. 1, pp. 42-47, Jan. 2009.
    • (2009) IEEE Network , vol.23 , Issue.1 , pp. 42-47
    • Hu, J.1    Yu, X.2    Qiu, D.3    Chen, A.H.H.4
  • 16
    • 33745486745 scopus 로고    scopus 로고
    • Multi-resolution abnormal trace detection using varied-length N-grams and automata
    • Seattle, USA, June
    • G. Jiang, H. Chen, C. Ungureanu, and K. I. Yoshihira, "Multi-resolution Abnormal Trace Detection Using Varied-length N-grams and Automata", in Proc. 2nd Intl. Conf. on Automatic Comp., Seattle, USA, June 2005, pp. 111-122.
    • (2005) Proc. 2nd Intl. Conf. on Automatic Comp. , pp. 111-122
    • Jiang, G.1    Chen, H.2    Ungureanu, C.3    Yoshihira, K.I.4
  • 20
  • 22
    • 84893260142 scopus 로고    scopus 로고
    • Mozilla-Testers, 2012. [Online]. https://developer.mozilla.org/en/ Mozilla-automated-tes ting
    • (2012)
  • 24
    • 78149297786 scopus 로고    scopus 로고
    • Learning rules for anomaly detection of hostile network traffic
    • Melbourne, Florida, USA, Nov
    • M. Mahoney and P. Chan, "Learning rules for anomaly detection of hostile network traffic", in Proc. 3rd IEEE Intl. Conf. on Data Mining, Melbourne, Florida, USA, Nov. 2003, pp. 601-604.
    • (2003) Proc. 3rd IEEE Intl. Conf. on Data Mining , pp. 601-604
    • Mahoney, M.1    Chan, P.2
  • 25
    • 34250315640 scopus 로고    scopus 로고
    • An overview of anomaly detection techniques: Existing solutions and latest technological trends
    • Aug.
    • A. Patcha and J. M. Park, "An overview of anomaly detection techniques: Existing solutions and latest technological trends", Computer Networks, vol. 51, no. 12, pp. 3448-3470, Aug. 2007.
    • (2007) Computer Networks , vol.51 , Issue.12 , pp. 3448-3470
    • Patcha, A.1    Park, J.M.2
  • 26
    • 0024610919 scopus 로고
    • A tutorial on hidden Markov models and selected applications in speech recognition
    • Feb.
    • L. R Rabiner, "A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition", Proc. of IEEE, vol. 77, no. 2, pp. 257-286, Feb. 1989.
    • (1989) Proc. of IEEE , vol.77 , Issue.2 , pp. 257-286
    • Rabiner, L.R.1
  • 27
    • 84885774862 scopus 로고    scopus 로고
    • A framework for constructing features and models for intrusion detection systems
    • Nov.
    • W. Lee and S. J. Stolfo, "A framework for constructing features and models for intrusion detection systems.", ACM Trans. Inf. Syst. Secur., vol. 3, no. 4, pp. 227-261, Nov. 2000.
    • (2000) ACM Trans. Inf. Syst. Secur. , vol.3 , Issue.4 , pp. 227-261
    • Lee, W.1    Stolfo, S.J.2
  • 29
    • 0037252253 scopus 로고    scopus 로고
    • Determining the operational limits of an anomaly-based intrusion detector
    • K. M. C. Tan and R. A. Maxion, "Determining the Operational Limits of an Anomaly-Based Intrusion Detector", IEEE Journal on Seletected Areas in Communications, vol. 21, no. 1, pp. 96-110, 2003.
    • (2003) IEEE Journal on Seletected Areas in Communications , vol.21 , Issue.1 , pp. 96-110
    • Tan, K.M.C.1    Maxion, R.A.2
  • 30
    • 84907095419 scopus 로고    scopus 로고
    • R: A language and environment for statistical computing
    • R Development Core Team
    • R Development Core Team, "R: A Language and Environment for Statistical Computing", R Foundation for Statistical Computing, 2011.
    • (2011) R Foundation for Statistical Computing
  • 33
    • 6344239144 scopus 로고    scopus 로고
    • Modeling program behaviors by hidden Markov models for intrusion detection
    • Shanghai, China, Aug
    • W. Wang, X. H. Guan, and X. L. Zhang, "Modeling program behaviors by hidden Markov models for intrusion detection", in Proc. of Intl. Conf. on Machine Learning and Cybernetics, Shanghai, China, Aug. 2004, pp. 2830-2835.
    • (2004) Proc. of Intl. Conf. on Machine Learning and Cybernetics , pp. 2830-2835
    • Wang, W.1    Guan, X.H.2    Zhang, X.L.3
  • 36
    • 0036647172 scopus 로고    scopus 로고
    • Multivariate statistical analysis of audit trails for host-based intrusion detection
    • July
    • N. Ye, S. M. Emran, Q. Chen, and S. Vilbert, "Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection", IEEE Trans. on Computers, vol. 51, no. 7, pp. 810-820, July 2002.
    • (2002) IEEE Trans. on Computers , vol.51 , Issue.7 , pp. 810-820
    • Ye, N.1    Emran, S.M.2    Chen, Q.3    Vilbert, S.4
  • 37
    • 0037209446 scopus 로고    scopus 로고
    • Host-based intrusion detection using dynamic and static behavioral models
    • Jan.
    • D. Y. Yeung and Y. Ding., "Host-based intrusion detection using dynamic and static behavioral models", Pattern Recognition, vol. 36, no. 1, pp. 229-243, Jan. 2003.
    • (2003) Pattern Recognition , vol.36 , Issue.1 , pp. 229-243
    • Yeung, D.Y.1    Ding, Y.2
  • 38
    • 80051781512 scopus 로고    scopus 로고
    • Feature representation and selection in malicious code detection methods based on static system calls
    • D. Yuxin, Y. Xuebing, Z. Di, D. Li, and A. Zhanchao, "Feature representation and selection in malicious code detection methods based on static system calls", Computers & Security, vol. 30, no. 6-7, pp. 514-524, 2011.
    • (2011) Computers & Security , vol.30 , Issue.6-7 , pp. 514-524
    • Yuxin, D.1    Xuebing, Y.2    Di, Z.3    Li, D.4    Zhanchao, A.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.