Nothing Special   »   [go: up one dir, main page]

×
Please click here if you are not redirected within a few seconds.
This research views application programs as dynamical systems, and applies dynamical system analysis tools operating on time series data, merely the system ...
We introduce some of the well-established techniques and formalisms of Dynamical System Theory into analysis of application behavior via system calls analysis.
A method is introduced for detecting intrusions at the level of privileged processes. Evidence is given that short sequences of system calls executed.
Abstract. A method is introduced for detecting intrusions at the level of privileged processes. Evidence is given that short sequences of system calls executed ...
We extend prior research on system call anomaly detec- tion modeling methods for intrusion detection by incorpo- rating dynamic window sizes.
With taking the system-call traces invoked during the program running as known prerequisite, our model predicts sequence of system-calls that is most likely to ...
The approach is based on rough set theory and capable of extracting a set of rules with the minimum size to form a normal behavior model from the record of ...
An unsupervised host-based intrusion detection system based on system call arguments and sequences that has a good signal-to-noise ratio, and is also able ...
Abstract—We describe an unsupervised host-based intrusion detection system based on system calls arguments and sequences.
Feb 1, 2022 · The system call sequences of processes are important for host-based anomaly detection. However, the detection accuracy can be seriously degenerated.