Sciweavers

8177 search results - page 130 / 1636
» Detecting System Emulators
Sort
View
ACSAC
2000
IEEE
14 years 2 months ago
A Network Audit System for Host-based Intrusion Detection (NASHID) in Linux
Recent work has shown that conventional operating system audit trails are insufficient to detect low-level network attacks. Because audit trails are typically based upon system c...
Thomas E. Daniels, Eugene H. Spafford
SP
1999
IEEE
194views Security Privacy» more  SP 1999»
14 years 2 months ago
Detecting Intrusions using System Calls: Alternative Data Models
Intrusion detection systems rely on a wide variety of observable data to distinguish between legitimate and illegitimate activities. In this paper we study one such observable-seq...
Christina Warrender, Stephanie Forrest, Barak A. P...
JSW
2007
138views more  JSW 2007»
13 years 10 months ago
Learning Problem and BCJR Decoding Algorithm in Anomaly-based Intrusion Detection Systems
— The anomaly-based intrusion detection systems examine current system activity do find deviations from normal system activity. The present paper proposes a method for normal act...
Veselina G. Jecheva, Evgeniya P. Nikolova
ICDCSW
2011
IEEE
12 years 10 months ago
Finding a "Kneedle" in a Haystack: Detecting Knee Points in System Behavior
—Computer systems often reach a point at which the relative cost to increase some tunable parameter is no longer worth the corresponding performance benefit. These “knees” t...
Ville Satopaa, Jeannie R. Albrecht, David Irwin, B...
KDD
2004
ACM
124views Data Mining» more  KDD 2004»
14 years 10 months ago
Eigenspace-based anomaly detection in computer systems
We report on an automated runtime anomaly detection method at the application layer of multi-node computer systems. Although several network management systems are available in th...
Hisashi Kashima, Tsuyoshi Idé