Intrusion detection using sequences of system calls

SA Hofmeyr, S Forrest… - Journal of computer …, 1998 - content.iospress.com
A method is introduced for detecting intrusions at the level of privileged processes. Evidence
is given that short sequences of system calls executed by running processes are a good …

Detection and classification of intrusions and faults using sequences of system calls

JBD Cabrera, L Lewis, RK Mehra - Acm sigmod record, 2001 - dl.acm.org
This paper investigates the use of sequences of system calls for classifying intrusions and
faults induced by privileged processes in Unix. Classification is an essential capability for …

Intrusion detection via system call traces

AP Kosoresow, SA Hofmeyer - IEEE software, 1997 - ieeexplore.ieee.org
Unusual behavior in computer systems can be detected by monitoring the system calls
being executed by programs. Analysis of the temporal ordering of these calls reveals that …

Detecting intrusions using system calls: Alternative data models

C Warrender, S Forrest… - Proceedings of the 1999 …, 1999 - ieeexplore.ieee.org
Intrusion detection systems rely on a wide variety of observable data to distinguish between
legitimate and illegitimate activities. We study one such observable-sequences of system …

Use of k-nearest neighbor classifier for intrusion detection

Y Liao, VR Vemuri - Computers & security, 2002 - Elsevier
A new approach, based on the k-Nearest Neighbor (kNN) classifier, is used to classify
program behavior as normal or intrusive. Program behavior, in turn, is represented by …

Characterizing the behavior of a program using multiple-length n-grams

C Marceau - Proceedings of the 2000 workshop on New security …, 2001 - dl.acm.org
Some recent advances in intrusion detection are based on detecting anomalies in program
behavior, as characterized by the sequence of kernel calls the program makes. Specifically …

Using text categorization techniques for intrusion detection

Y Liao, VR Vemuri - 11th USENIX Security Symposium (USENIX Security …, 2002 - usenix.org
A new approach, based on the k-Nearest Neighbor (kNN) classifier, is used to classify
program behavior as normal or intrusive. Short sequences of system calls have been used …

[PDF][PDF] Computer system intrusion detection: A survey

AK Jones, RS Sielken - Computer Science Technical Report, 2000 - princeton.edu
The ability to detect intruders in computer systems increases in importance as computers are
increasingly integrated into the systems that we rely on for the correct functioning of society …

Detecting malicious software by monitoring anomalous windows registry accesses

F Apap, A Honig, S Hershkop, E Eskin… - Recent Advances in …, 2002 - Springer
We present a host-based intrusion detection system (IDS) for Microsoft Windows. The core of
the system is an algorithm that detects attacks on a host machine by looking for anomalous …

[PDF][PDF] Operating system enhancements to prevent the misuse of system calls

M Bernaschi, E Gabrielli, LV Mancini - … of the 7th ACM conference on …, 2000 - dl.acm.org
We propose a cost-effective mechanism, to control the invocation of critical, from the security
viewpoint, system calls. The integration into existing UNIX operating systems is carried out …