Proceedings 1996 IEEE Symposium on Security and Privacy
DOI: 10.1109/secpri.1996.502675
|View full text |Cite
|
Sign up to set email alerts
|

A sense of self for Unix processes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
945
0
17

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 1,094 publications
(964 citation statements)
references
References 5 publications
2
945
0
17
Order By: Relevance
“…For example, supervised learning has been applied to detect insider threats. System call traces from normal activity and anomaly data are gathered [13,14]; features are extracted from this data using n-gram and finally, trained with classifiers. Lia and Vemuri exploit text classification idea in insider threat domain [15] where each system call is treated as a word in bag of words model.…”
Section: Related Workmentioning
confidence: 99%
“…For example, supervised learning has been applied to detect insider threats. System call traces from normal activity and anomaly data are gathered [13,14]; features are extracted from this data using n-gram and finally, trained with classifiers. Lia and Vemuri exploit text classification idea in insider threat domain [15] where each system call is treated as a word in bag of words model.…”
Section: Related Workmentioning
confidence: 99%
“…Anomaly detection models the normal behaviors of the subjects being monitored and identifies anything that significantly deviates from the normal behaviors as attacks. Many techniques have been proposed for anomaly detection, including statistical approaches (e.g., Haystack [36], NIDES/STAT [15]), machine learning approaches (e.g., TIM [37], IBL [20]), computer immunological approaches [7], [8], [39], and specification based approaches [17], [18], [35], [38]. Misuse detection models the patterns of known attacks or vulnerabilities, and identifies actions that conform to such patterns as attacks.…”
Section: Intrusion Detectionmentioning
confidence: 99%
“…Buffer overflow attacks are the best-known example of this type of attacks. For years, people have been working on preventing, detecting, and tolerating these attacks [1][2][3][4][5][6][7][8][9][10][11][12][13]. Despite these efforts, current systems are not secure.…”
Section: Introductionmentioning
confidence: 99%