作者
Christina Warrender, Stephanie Forrest, Barak Pearlmutter
发表日期
1999/5/14
研讨会论文
Proceedings of the 1999 IEEE symposium on security and privacy (Cat. No. 99CB36344)
页码范围
133-145
出版商
IEEE
简介
Intrusion detection systems rely on a wide variety of observable data to distinguish between legitimate and illegitimate activities. We study one such observable-sequences of system calls into the kernel of an operating system. Using system-call data sets generated by several different programs, we compare the ability of different data modeling methods to represent normal behavior accurately and to recognize intrusions. We compare the following methods: simple enumeration of observed sequences; comparison of relative frequencies of different sequences; a rule induction technique; and hidden Markov models (HMMs). We discuss the factors affecting the performance of each method and conclude that for this particular problem, weaker methods than HMMs are likely sufficient.
引用总数
19992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024523317486110138147109103103787064647174716760645654382113
学术搜索中的文章
C Warrender, S Forrest, B Pearlmutter - Proceedings of the 1999 IEEE symposium on security …, 1999
C Warrender, S Forrest, B Pearlmutter - IEEE Symposium on security and Privacy (1999)
C Warrender, S Forrest - 1999