MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM) 2017
DOI: 10.1109/milcom.2017.8170835
|View full text |Cite
|
Sign up to set email alerts
|

A dataset generator for next generation system call host intrusion detection systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 13 publications
0
9
0
Order By: Relevance
“…Moreover, the normal behavior and its origin are either not described at all or only insufficiently described. Pendleton and Xu describe in [1] based on a syscall collector for data generation. For instrumentation the Intel tool "Pin" is used 1 .…”
Section: Background and Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Moreover, the normal behavior and its origin are either not described at all or only insufficiently described. Pendleton and Xu describe in [1] based on a syscall collector for data generation. For instrumentation the Intel tool "Pin" is used 1 .…”
Section: Background and Related Workmentioning
confidence: 99%
“…Pendleton and Xu describe in [1] based on a syscall collector for data generation. For instrumentation the Intel tool "Pin" is used 1 . It allows applications to be extended with their own source code at runtime and to profile the application.…”
Section: Background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The need for datasets and their generation are recurrent topics related to several research fields. Thus, there are published works in research areas as varied as radio signal processing [29], vehicular technology [30,31], vehicle-to-vehicle and vehicle-to-infrastructure wireless communication [32], computer vision [33] and pattern recognition [34], cyber threat intelligence [35], host intrusion detection [36], network intrusion detection system [37,38], smart grids [39], and software vulnerabilities [40][41][42][43][44][45], among many others.…”
Section: Introductionmentioning
confidence: 99%
“…They present an experiment using a network simulator with 10 simulated scenarios of mobility of VANET hosts and 5 types of emulated security threats with the capacity to define the total number of vehicles and the number of malicious hosts in the VANET. In [124] a generator architecture (semi-synthetic approach) is proposed for datasets of system calls used for host intrusion detection systems (HIDS). The generator architecture is generic, but it is demonstrated using Ubuntu Linux and Mozilla Firefox as the profiled application.…”
Section: Synthetic Data Generationmentioning
confidence: 99%