Sciweavers

233 search results - page 5 / 47
» The Evolution of System-Call Monitoring
Sort
View
OOIS
2000
Springer
14 years 1 months ago
Information Monitors: An Architecture Based on XML
In this paper we present an approach to allow monitoring of XML documents on the World Wide Web. We describe a distributed information monitoring architecture based on monitor rule...
George Spanoudakis, Andrea Zisman
DIMVA
2011
13 years 1 months ago
Operating System Interface Obfuscation and the Revealing of Hidden Operations
Many software security solutions—including malware analyzers, information flow tracking systems, auditing utilities, and host-based intrusion detectors—rely on knowledge of s...
Abhinav Srivastava, Andrea Lanzi, Jonathon T. Giff...
CCS
2008
ACM
13 years 11 months ago
A practical mimicry attack against powerful system-call monitors
System-call monitoring has become the basis for many hostbased intrusion detection as well as policy enforcement techniques. Mimicry attacks attempt to evade system-call monitorin...
Chetan Parampalli, R. Sekar, Rob Johnson
CONEXT
2006
ACM
14 years 3 months ago
Reformulating the monitor placement problem: optimal network-wide sampling
Confronted with the generalization of monitoring in operational networks, researchers have proposed placement algorithms that can help ISPs deploy their monitoring infrastructure ...
Gion Reto Cantieni, Gianluca Iannaccone, Chadi Bar...
RAID
2007
Springer
14 years 3 months ago
Understanding Precision in Host Based Intrusion Detection
Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin...