메뉴 건너뛰기




Volumn 63, Issue 4, 2014, Pages 807-819

A semantic approach to host-based intrusion detection systems using contiguousand discontiguous system call patterns

Author keywords

ADFA LD; anomaly detection; computer security; host based IDS; Intrusion detection; system calls

Indexed keywords

COMPUTER CRIME; COMPUTER OPERATING SYSTEMS; ERRORS; PERSONAL COMPUTING; SECURITY OF DATA; SEMANTICS;

EID: 84897137099     PISSN: 00189340     EISSN: None     Source Type: Journal    
DOI: 10.1109/TC.2013.13     Document Type: Article
Times cited : (272)

References (67)
  • 1
    • 79251616434 scopus 로고    scopus 로고
    • Stuxnet and the future of cyber war
    • J.P. Farwell and R. Rohozinski, "Stuxnet and the Future of Cyber War, " Survival, vol. 53, no. 1, pp. 23-40, 2011.
    • (2011) Survival , vol.53 , Issue.1 , pp. 23-40
    • Farwell, J.P.1    Rohozinski, R.2
  • 2
    • 78349299834 scopus 로고    scopus 로고
    • Stuxnet, the real start of cyber warfare?
    • T. Chen, "Stuxnet, the Real Start of Cyber Warfare?" IEEE Network, vol. 24, no. 6, pp. 2-3, Nov./Dec. 2010.
    • IEEE Network , vol.24 , Issue.6 , pp. 2-3
    • Chen, T.1
  • 5
    • 84897134636 scopus 로고    scopus 로고
    • Defence Signals Directorate-Cyber Security Operations Centre Mar.
    • Defence Signals Directorate-Cyber Security Operations Centre, "Top 35 Mitigation Strategies for Targeted Cyber Intrusions, " http://www.dsd.gov.au/publications/Top-35-Mitigations.pdf, Mar. 2012.
    • (2012) Top 35 Mitigation Strategies for Targeted Cyber Intrusions
  • 8
    • 79953303626 scopus 로고    scopus 로고
    • Exploring discrepancies in findings obtained with the kdd cup '99 data set
    • V. Engen, J. Vincent, and K. Phalp, "Exploring Discrepancies in Findings Obtained with the KDD Cup '99 Data Set, " Intelligent Data Analysis, vol. 15, no. 2, pp. 251-276, 2011.
    • (2011) Intelligent Data Analysis , vol.15 , Issue.2 , pp. 251-276
    • Engen, V.1    Vincent, J.2    Phalp, K.3
  • 9
    • 33749606368 scopus 로고    scopus 로고
    • Labelling clusters in an intrusion detection system using a combination of clustering evaluation techniques
    • DOI 10.1109/HICSS.2006.247, 1579550, Proceedings of the 39th Annual Hawaii International Conference on System Sciences, HICSS'06
    • S. Petrovic, G. Alvarez, A. Orfila, and J. Carbo, "Labelling Clusters in an Intrusion Detection System Using a Combination of Clustering Evaluation Techniques, " Proc. 39th Ann. Hawaii Int'l Conf. System Sciences (HICSS '06), vol. 6, p. 129b, Jan. 2006. (Pubitemid 44539456)
    • (2006) Proceedings of the Annual Hawaii International Conference on System Sciences , vol.6
    • Petrovic, S.1    Alvarez, G.2    Orfila, A.3    Carbo, J.4
  • 11
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 darpa intrusion detection system evalua tions as performed by lincoln laboratory
    • Nov.
    • J. McHugh, "Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evalua tions as Performed by Lincoln Laboratory, " ACM Trans. Informa tion and System Security, vol. 3, no. 4, pp. 262-294, http://doi.acm.org/10.1145/382912.382923, Nov. 2000.
    • (2000) ACM Trans. Informa Tion and System Security , vol.3 , Issue.4 , pp. 262-294
    • McHugh, J.1
  • 14
    • 44249089794 scopus 로고    scopus 로고
    • Effective value of decision tree with KDD 99 intrusion detection datasets for intrusion detection system
    • DOI 10.1109/ICACT.2008.4493974, 4493974, 10th International Conference on Advanced Communication Technology, ICACT 2008 - Proceedings
    • J.-H. Lee, J.-H. Lee, S.-G. Sohn, J.-H. Ryu, and T.-M. Chung, "Effective Value of Decision Tree with KDD 99 Intrusion Detection Datasets for Intrusion Detection System, " Proc. 10th Int'l Conf. Advanced Comm. Technology (ICACT), vol. 2, pp. 1170-1175, Feb. 2008. (Pubitemid 351720687)
    • (2008) International Conference on Advanced Communication Technology, ICACT , vol.2 , pp. 1170-1175
    • Lee, J.-H.1    Leet, J.-H.2    Sohn, S.-G.3    Ryu, J.-H.4    Chung, T.-M.5
  • 19
    • 0026242806 scopus 로고
    • File system measurements and their application to the design of efficient operation logging algorithms
    • Sept.
    • D. Bacon, "File System Measurements and Their Application to the Design of Efficient Operation Logging Algorithms, " Proc. 10th Symp. Reliable Distributed Systems, pp. 21-30, Sept. 1991.
    • (1991) Proc. 10th Symp. Reliable Distributed Systems , pp. 21-30
    • Bacon, D.1
  • 22
  • 23
    • 21644438395 scopus 로고    scopus 로고
    • An efficient hidden markov model training scheme for anomaly intrusion detection of server applications based on system calls
    • Proceedings - 2004 12th IEEE International Conference on Networks, ICON 2004 - Unity in Diversity
    • X. Hoang and J. Hu, "An Efficient Hidden Markov Model Training Scheme for Anomaly Intrusion Detection of Server Applications Based on System Calls, " Proc. IEEE Int'l Conf. Networks (ICON 2004), vol. 2, pp. 470-474, Nov. 2004. (Pubitemid 40926525)
    • (2004) Proceedings - IEEE International Conference on Networks, ICON , vol.2 , pp. 470-474
    • Hoang, X.D.1    Hu, J.2
  • 25
    • 0031258214 scopus 로고    scopus 로고
    • Computer Immunology
    • S. Forrest, S.A. Hofmeyr, and A. SoMayaji, "Computer Immunology, " Comm. ACM, vol. 40, no. 10, pp. 88-96, http://doi.acm.org/10.1145/262793. 262811, Oct. 1997. (Pubitemid 127442917)
    • (1997) Communications of the ACM , vol.40 , Issue.10 , pp. 88-96
    • Forrest, S.1    Hofmeyr, S.A.2    Somayaji, A.3
  • 26
    • 0032313923 scopus 로고    scopus 로고
    • Intrusion detection using sequences of system calls
    • S.A. Hofmeyr, S. Forrest, and A. SoMayaji, "Intrusion Detection Using Sequences of System Calls, " J. Computer Security, vol. 6, no. 3, p. 151, http://search.ebscohost.com/login.aspx?direct =true&db=tsh&AN= 1531432&site=ehost-live, 1998.
    • (1998) J. Computer Security , vol.6 , Issue.3 , pp. 151
    • Hofmeyr, S.A.1    Forrest, S.2    Somayaji, A.3
  • 27
    • 84890861404 scopus 로고    scopus 로고
    • A multi-layer model for anomaly intrusion detection using program sequences of system calls
    • X.D. Hoang, J. Hu, and P. Bertok, "A Multi-Layer Model for Anomaly Intrusion Detection Using Program Sequences of System Calls, " Proc. 11th IEEE Int'l. Conf. Networks, pp. 531-536, 2003.
    • (2003) Proc. 11th IEEE int'L. Conf. Networks , pp. 531-536
    • Hoang, X.D.1    Hu, J.2    Bertok, P.3
  • 28
    • 0037282635 scopus 로고    scopus 로고
    • Efficient anomaly detection by modeling privilege flows using hidden markov model
    • S.-B. Cho and H.-J. Park, "Efficient Anomaly Detection by Modeling Privilege Flows Using Hidden Markov Model, " Computers and Security, vol. 22, no. 1, pp. 45-55, 2003.
    • (2003) Computers and Security , vol.22 , Issue.1 , pp. 45-55
    • Cho, S.-B.1    Park, H.-J.2
  • 29
    • 65249107163 scopus 로고    scopus 로고
    • A simple and efficient hidden markov model scheme for host-based anomaly intrusion detection
    • Jan./Feb.
    • J. Hu, X. Yu, D. Qiu, and H.-H. Chen, "A Simple and Efficient Hidden Markov Model Scheme for Host-Based Anomaly Intrusion Detection, " IEEE Network, vol. 23, no. 1, pp. 42-47, Jan./Feb. 2009.
    • (2009) IEEE Network , vol.23 , Issue.1 , pp. 42-47
    • Hu, J.1    Yu, X.2    Qiu, D.3    Chen, H.-H.4
  • 33
    • 0036647172 scopus 로고    scopus 로고
    • Multivariate statistical analysis of audit trails for host-based intrusion detection
    • DOI 10.1109/TC.2002.1017701
    • N. Ye, S. Emran, Q. Chen, and S. Vilbert, "Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection, " IEEE Trans. Computers, vol. 51, no. 7, pp. 810-820, July 2002. (Pubitemid 34835448)
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.7 , pp. 810-820
    • Ye, N.1    Emran, S.M.2    Chen, Q.3    Vilbert, S.4
  • 38
    • 67649202948 scopus 로고    scopus 로고
    • Beyond output voting: Detecting compromised replicas using hmm-based behavioral distance
    • Apr.-June
    • D. Gao, M. Reiter, and D. Song, "Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based Behavioral Distance, " IEEE Trans. Dependable and Secure Computing, vol. 6, no. 2, pp. 96-110, Apr.-June 2009.
    • (2009) IEEE Trans. Dependable and Secure Computing , vol.6 , Issue.2 , pp. 96-110
    • Gao, D.1    Reiter, M.2    Song, D.3
  • 44
    • 84883090850 scopus 로고    scopus 로고
    • The application of extreme learning machines to the network intrusion detection problem
    • G. Creech and F. Jiang, "The Application of Extreme Learning Machines to the Network Intrusion Detection Problem, " AIP Conf. Proc., vol. 1479, no. 1, pp. 1506-1511, http://link.aip.org/link/?APC/1479/1506/1, 2012.
    • (2012) AIP Conf. Proc. , vol.1479 , Issue.1 , pp. 1506-1511
    • Creech, G.1    Jiang, F.2
  • 47
    • 0034546374 scopus 로고    scopus 로고
    • Architecture for an artificial immune system
    • S.A. Hofmeyr and S. Forrest, "Architecture for an Artificial Immune System, " Evolutionary Computation, vol. 8, no. 4, pp. 443-473, 2000.
    • (2000) Evolutionary Computation , vol.8 , Issue.4 , pp. 443-473
    • Hofmeyr, S.A.1    Forrest, S.2
  • 49
    • 0031191630 scopus 로고    scopus 로고
    • The use of the area under the ROC curve in the evaluation of machine learning algorithms
    • PII S0031320396001422
    • A.P. Bradley, "The Use of the Area under the ROC Curve in the Evaluation of Machine Learning Algorithms, " Pattern Recognition, vol. 30, no. 7, pp. 1145-1159, http://www.sciencedirect.-com/science/article/pii/ S0031320396001422, 1997. (Pubitemid 127406521)
    • (1997) Pattern Recognition , vol.30 , Issue.7 , pp. 1145-1159
    • Bradley, A.P.1
  • 50
    • 68949196337 scopus 로고    scopus 로고
    • A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference
    • X.D. Hoang, J. Hu, and P. Bertok, "A Program-Based Anomaly Intrusion Detection Scheme Using Multiple Detection Engines and Fuzzy Inference, " J. Network and Computer Applications, vol. 32, no. 6, pp. 1219-1228, http://www.sciencedirect.com/science/article/pii/S108480450900071X, 2009.
    • (2009) J. Network and Computer Applications , vol.32 , Issue.6 , pp. 1219-1228
    • Hoang, X.D.1    Hu, J.2    Bertok, P.3
  • 51
    • 84935113569 scopus 로고
    • Error bounds for convolutional codes and an asymptotically optimum decoding algorithm
    • Apr.
    • A. Viterbi, "Error Bounds for Convolutional Codes and an Asymptotically Optimum Decoding Algorithm, " IEEE Trans. Information Theory, vol. 13, no. 2, pp. 260-269, Apr. 1967.
    • (1967) IEEE Trans. Information Theory , vol.13 , Issue.2 , pp. 260-269
    • Viterbi, A.1
  • 53
    • 84897138621 scopus 로고    scopus 로고
    • May
    • "Ubuntu Linux, " http://www.ubuntu.com, May 2012.
    • (2012) Ubuntu Linux
  • 56
    • 84897128358 scopus 로고    scopus 로고
    • May
    • "TikiWiki: CMS Groupware, " http://info.tiki.org/Tiki+Wiki+ CMS+Groupware, May 2012.
    • (2012) TikiWiki: CMS Groupware
  • 58
    • 84897142852 scopus 로고    scopus 로고
    • Nov.
    • "Offensive Security Certified Professional, " http://www. offensive-security.com/information-security-certifications/oscp-offensive- security-certified-professional/, Nov. 2012.
    • (2012) Offensive Security Certified Professional
  • 60
    • 84940104123 scopus 로고    scopus 로고
    • A data mining framework for building intrusion detection models
    • W. Lee, S. Stolfo, and K. Mok, "A Data Mining Framework for Building Intrusion Detection Models, " Proc. IEEE Symp. Security and Privacy, pp. 120-132, 1999.
    • (1999) Proc. IEEE Symp. Security and Privacy , pp. 120-132
    • Lee, W.1    Stolfo, S.2    Mok, K.3
  • 61
    • 0037209446 scopus 로고    scopus 로고
    • Host-based intrusion detection using dynamic and static behavioural models
    • D. Yeung and Y. Ding, "Host-Based Intrusion Detection Using Dynamic and Static Behavioural Models, " Pattern Recognition, vol. 36, no. 1, pp. 229-243, 2003.
    • (2003) Pattern Recognition , vol.36 , Issue.1 , pp. 229-243
    • Yeung, D.1    Ding, Y.2
  • 62
    • 13544269338 scopus 로고    scopus 로고
    • Application of SVM and ANN for intrusion detection
    • DOI 10.1016/j.cor.2004.03.019, PII S0305054804000711, Application of Neural Networks
    • W.-H. Chen, S.-H. Hsu, and H.-P. Shen, "Application of SVM and ANN for Intrusion Detection, " Computers and Operations Research, vol. 32, no. 10, pp. 2617-2634, http://www.sciencedirect.com/science/article/pii/ S0305054804000711, 2005. (Pubitemid 40219764)
    • (2005) Computers and Operations Research , vol.32 , Issue.10 , pp. 2617-2634
    • Chen, W.-H.1    Hsu, S.-H.2    Shen, H.-P.3
  • 63
    • 36549015685 scopus 로고    scopus 로고
    • Intrusion detection using text processing techniques with a kernel based similarity measure
    • DOI 10.1016/j.cose.2007.10.003, PII S0167404807001113
    • A. Sharma, A.K. Pujari, and K.K. Paliwal, "Intrusion Detection Using Text Processing Techniques with a Kernel Based Similarity Measure, " Computers and Security, vol. 26, no. 7, pp. 488-495, http://www.sciencedirect. com/science/article/pii/S0167404807001113, 2007. (Pubitemid 350191974)
    • (2007) Computers and Security , vol.26 , Issue.7-8 , pp. 488-495
    • Sharma, A.1    Pujari, A.K.2    Paliwal, K.K.3
  • 64
    • 33746752558 scopus 로고    scopus 로고
    • A fast host-based intrusion detection system using rough set theory
    • Springer
    • S. Rawat, V. Gulati, and A. Pujari, "A Fast Host-Based Intrusion Detection System Using Rough Set Theory, " Trans. Rough Sets IV, pp. 144-161, Springer, 2005.
    • (2005) Trans. Rough Sets IV , pp. 144-161
    • Rawat, S.1    Gulati, V.2    Pujari, A.3
  • 65
    • 79955697946 scopus 로고    scopus 로고
    • Classifying attacks in a network intrusion detection system based on artificial neural networks
    • M.R. Norouzian and S. Merati, "Classifying Attacks in a Network Intrusion Detection System Based on Artificial Neural Networks, " Proc. 13th Int'l Conf. Advanced Comm. Technology (ICACT), pp. 868-873, 2011.
    • (2011) Proc. 13th Int'l Conf. Advanced Comm. Technology (ICACT) , pp. 868-873
    • Norouzian, M.R.1    Merati, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.