International Conference on Networking and Communication, 2004. INCC 204.
DOI: 10.1109/incc.2004.1366573
|View full text |Cite
|
Sign up to set email alerts
|

A study of host-based IDS using system calls

Abstract: Absrruct -Intrusion detection systems (IDS) are complimentary to other security mechanisms such as access control and authentication, While Signature based IDS are limited to known attacks only, Anomaly based IDS are capable of detecting novel attacks. However, anomaly based systems usually trade performance for efficiency. In this paper, we analyze various anomaly based IDS and list the strengths and weaknesses of different schemes. We conclude that abstract stack model proposed by Wagner [Z] shows best perf… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 6 publications
0
6
0
Order By: Relevance
“…A program must interact with the operating system to utilize system's resources through libraries that directly or indirectly use a standard library, such as allocating memory and sending a packet over the network to communicate with other computers. By obtaining system and/or library call traces over time, it is possible to identify which state the computing unit was operating on by analyzing the call list [12]. In other words, a computing unit responds to an event by a series of computation of which leaves a deterministic trace of system and library calls.…”
Section: B Characterization Of Smart Grid Device Processesmentioning
confidence: 99%
“…A program must interact with the operating system to utilize system's resources through libraries that directly or indirectly use a standard library, such as allocating memory and sending a packet over the network to communicate with other computers. By obtaining system and/or library call traces over time, it is possible to identify which state the computing unit was operating on by analyzing the call list [12]. In other words, a computing unit responds to an event by a series of computation of which leaves a deterministic trace of system and library calls.…”
Section: B Characterization Of Smart Grid Device Processesmentioning
confidence: 99%
“…Host-based systems [12], [13], base their decisions on information obtained from a single host (usually log files, network traffic to and from the host, or information on processes running on the host), while network-based systems [20] obtain data by monitoring network traffic between hosts, and are usually run on a separate machine. Most current IDS technology still suffers from three main problems which limit their detection ability: low detection accuracy (registering high False Positive alarms and False Negative); low real-time performance (processing large amounts of traffic data in real time); and limited scalability (storing a large number of user profiles and attack signatures).…”
Section: Problem Statementmentioning
confidence: 99%
“…Kingsly Leung [2] introduced grid based and density based cluster approach for separating frequent item sets from non frequent item sets and they used their density based support mechanism for identifying unseen attack in anomaly detection. [1,8] introduced sequence based anomaly detection approach. Jiawei Han [6] Developed frequent pattern tree as a data structure for storing data in compact form and quick access of frequent item.…”
Section: Related Work and Related Stuffsmentioning
confidence: 99%