作者: Sebastian G. Elbaum , John C. Munson
DOI:
关键词:
摘要: The thrust of this paper is to present a new real-time approach detect aberrant modes system behavior induced by abnormal and unauthorized activities. theoretical foundation for the research program based on study software internal behavior. As executing, it will express set its many functionalities as sequential events. Each these has characteristic modules that execute. In addition, module sets execute with clearly defined measurable execution profiles. These profiles change executed change. Over time, normal be An attempt violate security result in outside activity thus perturbation We show, through analysis Linux kernel, we can very subtle shifts system.