Anomaly Detection based on System call
Last Update : 2005/01/22
-
S. Forrest, S. A. Hofmeyr, A. Somayaji, T.A. Longstaff,
A sense of self for Unix processes,
In Proceedinges of the 1996 IEEE Symposium on Computer Security and Privacy, pp. 120--128, 1996.
[paper]
-
A. P. Kosoresow, S. A. Hofmeyr,
Intrusion Detection via System Call Traces,
IEEE Software, vol. 14, pp. 24-42, 1997.
-
S. Forrest, S. A. Hofmeyr, A. Somayaji,
Intrusion detection using sequences of system calls,
Journal of Computer Security, Vol.6, pp. 151--180, 1998.
[paper]
-
G. Helmer, J. Wong, V. Honavar, L. Miller,
Intelligent agents for intrusion detection,
In Proceedings of the IEEE Information Technology Conference, pp. 121--124, Sep. 1998.
[paper]
-
W. Lee, S. Stolfo,
Data Mining Approaches for Intrusion Detection,
In Proceedings of the 7th USENIX Security Symposium, pp. 79--94, Jan. 1998.
[paper]
-
C. Warrender, S. Forrest, B. Pearlmutter,
Detecting intrusions using system calls: alternative data models,
In Proceedings of the 1999 IEEE Symposium on Security and Privacy, pp. 133--145, 1999.
[paper]
-
A. K. Ghosh, A. Schwartzbard, M. Shatz,
Learning Program Behavior Profiles for Intrusion Detection,
In Proceedings of the 1st USENIX Workshop on Intrusion Detection and Network Monitoring, pp. 51--62, Apr. 1999.
[paper]
-
C. Marceau,
Characterizing the behavior of a program using multiple-length n-grams.
In Proceedings of the New Security Paradigms Workshop 2000, pp. 101--110, 2000.
[paper]
-
R. Sekar, M. Bendre, P. Bollineni, D. Dhurjati,
A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors,
In Proceedings of the IEEE Symposium on Security and Privacy, pp. 144--155, 2001.
[paper]
-
S. Li, A. Jones,
Temporal Signatures for Intrusion Detection,
In Proceedings of the 17th Annual Computer Security Applications Conference, pp. 10--14, Dec. 2001.
[paper]
-
E. Eskin, W. Lee, S. Stolfo,
Modeling system call for intrusion detection using dynamic window sizes,
In Proceedings of the 2001 DARPA Information Survivability Conference \& Exposition, pp. 165--175, 2001.
-
W. Lee, D. Xiang,
Information-Theoretic Measures for Anomaly Detection,
In Proceedings of the IEEE Symposium on Security and Privacy, pp. 130--143, May. 2001.
[paper]
-
Y. Liao, V. Rao Vemuri,
Using Text Categorization Techniques for Intrusion Detection,
In Proceedings of the 11th USENIX Security Symposium. pp. 51--59, Aug. 2002.
[paper]
Back
To the Top of SSR