An intrusion detection system based on system call

被引:0
|
作者
Shen, Yue [1 ]
Yu, Fei [1 ]
Zhang, Ling-Fen [1 ]
An, Ji-Yao [1 ]
Zhu, Miao-Liang [1 ]
机构
[1] Hunan Agr Univ, Sch Comp & Informat, Changsha 410128, Peoples R China
关键词
intrusion detection; anomalous intrusion detection; system call; finite-state automation machine;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Intrusion detection is an efficient way to protect information system. This paper puts forward a new method of anomalous intrusion detection based on system call. It uses system calls regarded as input, and creates a FSA for the functions in the program. Then the FSA is used to detect the attack. Moreover, It can find the place of the vulnerability which exists in the program. This can help to alter the source program. Results are shown that this method is effective for some intrusion events.
引用
收藏
页码:150 / 153
页数:4
相关论文
共 50 条
  • [1] ADREM: System Call Based Intrusion Detection Framework
    Vaduva, Jan-Alexandru
    Chiscariu, Radu-Emanuel
    Culic, Ioana
    Florea, Iulia-Maria
    Rughinis, Razvan
    NEW TECHNOLOGIES AND REDESIGNING LEARNING SPACES, VOL I, 2019, : 159 - 164
  • [2] Anomaly Based Host Intrusion Detection System Using Semantic Based System Call Patterns
    Anandapriya, M.
    Lakshmanan, B.
    PROCEEDINGS OF 2015 IEEE 9TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO), 2015,
  • [3] Intrusion detection via system call traces
    Kosoresow, AP
    Hofmeyr, SA
    IEEE SOFTWARE, 1997, 14 (05) : 35 - &
  • [4] An intrusion detection method based on system call temporal serial analysis
    Pu, Shi
    Lang, Bo
    ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS: WITH ASPECTS OF THEORETICAL AND METHODOLOGICAL ISSUES, 2007, 4681 : 656 - +
  • [5] An Intrusion Detection Approach Based on System Call Sequences and Rules Extraction
    Ye Qing
    Wu Xiaoping
    Yan Bo
    2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 14 - 17
  • [6] Intrusion detection based on cross-correlation of system call sequences
    Zhang, XQ
    Zhu, ZL
    Fan, PZ
    ICTAI 2005: 17TH IEEE INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2005, : 277 - 283
  • [7] Advanced Anomaly Intrusion Detection Technique For Host Based System Using System Call Patterns
    Maske, Sandeep Ankush
    Parvat, Thaksen. J.
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 2, 2016, : 441 - 444
  • [8] The Impact of Different System Call Representations on Intrusion Detection
    Wunderlich, Sarah
    Ring, Markus
    Landes, Dieter
    Hotho, Andreas
    LOGIC JOURNAL OF THE IGPL, 2022, 30 (02) : 239 - 251
  • [9] Intrusion detection model of host system call sequence based on neighbor algorithm
    Wang, Z
    Peng, XG
    ISTM/2005: 6TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-9, CONFERENCE PROCEEDINGS, 2005, : 519 - 522
  • [10] An intrusion detection model based on the maximum likelihood short system call sequence
    Jia, Chunfu
    Zhong, Anming
    INTELLIGENT COMPUTING IN SIGNAL PROCESSING AND PATTERN RECOGNITION, 2006, 345 : 709 - 714