Beginning with the work of Forrest et al, several researchers have developed intrusion detection techniques based on modeling program behaviors in terms of system calls. A weakness of these techniques is that they focus primarily on system call names, and not the arguments. This weakness makes them susceptible to several classes of attacks, including mimicry attacks, attacks on securitycritical data, and race-condition attacks. To address this weakness, we present an approach for capturing data-flow behaviors of programs. We provide a formal definition of data-flow behaviors on system call traces, and describe efficient algorithms for building such models. Our algorithm can be layered on top of most existing control-flow models. This layeri...
Model-based intrusion detectors restrict program execution to a previously computed model of expecte...
this paper presents a novel anomaly detection approach that takes into account the information conta...
Abstract. Attacks against privileged applications can be detected by analyzing the stream of system ...
Part 9: Intrusion DetectionInternational audienceThe most common anomaly detection mechanisms at app...
Intrusion detection systems rely on a wide variety of observable data to distinguish between legitim...
Intrusion detection systems rely on a wide variety of observable data to distinguish between legitim...
We describe an unsupervised host-based intrusion detection system based on system call arguments and...
We describe an unsupervised host-based intrusion detection system based on system call arguments and...
We describe an unsupervised host-based intrusion detection system based on system call arguments and...
We describe an unsupervised host-based intrusion detection system based on system call arguments and...
We investigate how system call-based intrusion detectors can be made more resistant against mimicry ...
Model-based intrusion detectors restrict program execution to a previously computed model of expecte...
We investigate how system call-based intrusion detectors can be made more resistant against mimicry ...
Intrusion detection systems rely on a wide variety of observ-able data to distinguish between legiti...
Models based on system calls are a popular and common approach to characterize the run-time behavior...
Model-based intrusion detectors restrict program execution to a previously computed model of expecte...
this paper presents a novel anomaly detection approach that takes into account the information conta...
Abstract. Attacks against privileged applications can be detected by analyzing the stream of system ...
Part 9: Intrusion DetectionInternational audienceThe most common anomaly detection mechanisms at app...
Intrusion detection systems rely on a wide variety of observable data to distinguish between legitim...
Intrusion detection systems rely on a wide variety of observable data to distinguish between legitim...
We describe an unsupervised host-based intrusion detection system based on system call arguments and...
We describe an unsupervised host-based intrusion detection system based on system call arguments and...
We describe an unsupervised host-based intrusion detection system based on system call arguments and...
We describe an unsupervised host-based intrusion detection system based on system call arguments and...
We investigate how system call-based intrusion detectors can be made more resistant against mimicry ...
Model-based intrusion detectors restrict program execution to a previously computed model of expecte...
We investigate how system call-based intrusion detectors can be made more resistant against mimicry ...
Intrusion detection systems rely on a wide variety of observ-able data to distinguish between legiti...
Models based on system calls are a popular and common approach to characterize the run-time behavior...
Model-based intrusion detectors restrict program execution to a previously computed model of expecte...
this paper presents a novel anomaly detection approach that takes into account the information conta...
Abstract. Attacks against privileged applications can be detected by analyzing the stream of system ...