Anomaly Detection based on System call     Last Update : 2005/01/22



  1. S. Forrest, S. A. Hofmeyr, A. Somayaji, T.A. Longstaff, A sense of self for Unix processes, In Proceedinges of the 1996 IEEE Symposium on Computer Security and Privacy, pp. 120--128, 1996. [paper]
  2. A. P. Kosoresow, S. A. Hofmeyr, Intrusion Detection via System Call Traces, IEEE Software, vol. 14, pp. 24-42, 1997.
  3. S. Forrest, S. A. Hofmeyr, A. Somayaji, Intrusion detection using sequences of system calls, Journal of Computer Security, Vol.6, pp. 151--180, 1998. [paper]
  4. G. Helmer, J. Wong, V. Honavar, L. Miller, Intelligent agents for intrusion detection, In Proceedings of the IEEE Information Technology Conference, pp. 121--124, Sep. 1998. [paper]
  5. W. Lee, S. Stolfo, Data Mining Approaches for Intrusion Detection, In Proceedings of the 7th USENIX Security Symposium, pp. 79--94, Jan. 1998. [paper]
  6. C. Warrender, S. Forrest, B. Pearlmutter, Detecting intrusions using system calls: alternative data models, In Proceedings of the 1999 IEEE Symposium on Security and Privacy, pp. 133--145, 1999. [paper]
  7. A. K. Ghosh, A. Schwartzbard, M. Shatz, Learning Program Behavior Profiles for Intrusion Detection, In Proceedings of the 1st USENIX Workshop on Intrusion Detection and Network Monitoring, pp. 51--62, Apr. 1999. [paper]
  8. C. Marceau, Characterizing the behavior of a program using multiple-length n-grams. In Proceedings of the New Security Paradigms Workshop 2000, pp. 101--110, 2000. [paper]
  9. R. Sekar, M. Bendre, P. Bollineni, D. Dhurjati, A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors, In Proceedings of the IEEE Symposium on Security and Privacy, pp. 144--155, 2001. [paper]
  10. S. Li, A. Jones, Temporal Signatures for Intrusion Detection, In Proceedings of the 17th Annual Computer Security Applications Conference, pp. 10--14, Dec. 2001. [paper]
  11. E. Eskin, W. Lee, S. Stolfo, Modeling system call for intrusion detection using dynamic window sizes, In Proceedings of the 2001 DARPA Information Survivability Conference \& Exposition, pp. 165--175, 2001.
  12. W. Lee, D. Xiang, Information-Theoretic Measures for Anomaly Detection, In Proceedings of the IEEE Symposium on Security and Privacy, pp. 130--143, May. 2001. [paper]
  13. Y. Liao, V. Rao Vemuri, Using Text Categorization Techniques for Intrusion Detection, In Proceedings of the 11th USENIX Security Symposium. pp. 51--59, Aug. 2002. [paper]

Back
To the Top of SSR