作者: David P. Mankins
DOI:
关键词:
摘要: Kernel-based intrusion detection using Bloom filters is disclosed. In one of many possible embodiments for detecting an attack, a filter provided and used to generate data object. The object contains representative expected system-call behavior associated with computer program. embedded in operating system (“OS”) kernel upon invocation the Actual compared