Intrusion detection using sequences of system calls

作者: Steven A. Hofmeyr , Stephanie Forrest , Anil Somayaji

DOI: 10.3233/JCS-980109

关键词:

摘要: … work in intrusion detection. Section 3 describes our method of anomaly intrusion detection: … behavior, and then we define three ways of detecting anomalies. We then use the method to …

参考文章(29)
Debra Anderson, Thane Frivold, Alfonso Valdes, Next-generation Intrusion Detection Expert System (NIDES)A Summary ,(1997)
G.E. Liepens, H.S. Vaccaro, Intrusion detection: Its role and validation Computers & Security. ,vol. 11, pp. 347- 355 ,(1992) , 10.1016/0167-4048(92)90175-Q
Eugene H. Spafford, Daniel Farmer, The COPS Security Checker System USENIX Summer. pp. 165- 170 ,(1990)
Sandeep Kumar, Classification and detection of computer intrusions Purdue University. ,(1996)
J. O. Kephart, A biologically inspired immune system for computers Artificial Life. ,(1994)
R. Heady, G. Luger, A. Maccabe, M. Servilla, The architecture of a network level intrusion detection system Other Information: PBD: 15 Aug 1990. ,(1990) , 10.2172/425295
Eugene H. Spafford, Christoph L. Schuba, Countering Abuse of Name-Based Authentication ,(1994)
Purdue University. Department of Computer Sciences, Defending a Computer System Using Autonomous Agents ,(1995)
Dorothy Elizabeth Robling Denning, Cryptography and data security ,(1982)