Host-based intrusion detection system: Model and design features

被引:1
作者
Zegzhda, Pyotr [1 ]
Kort, Sernyon [1 ]
机构
[1] St Petersburg Polytechn Univ, St Petersburg, Russia
来源
COMPUTER NETWORK SECURITY, PROCEEDINGS | 2007年 / 1卷
关键词
intrusion detection; host-based intrusion detection system; attack; API Intercept;
D O I
10.1007/978-3-540-73986-9_29
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article reports on a model of a host-based intrusion detection system. Using a model of a state machine possible mechanisms of security violations in a computer system are analyzed. Thereafter principles are suggested for building an analysis module based on a model of dynamic monitoring of system statuses. The article concludes with a number of approaches for developing a data acquisition module for a host-based intrusion detection system.
引用
收藏
页码:340 / +
页数:2
相关论文
共 50 条
[21]   Enhancing Security of Host-Based Intrusion Detection Systems for the Internet of Things [J].
Nallakaruppan, M. K. ;
Somayaji, Siva Rama Krishnan ;
Fuladi, Siddhesh ;
Benedetto, Francesco ;
Ulaganathan, Senthil Kumaran ;
Yenduri, Gokul .
IEEE ACCESS, 2024, 12 :31788-31797
[22]   A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguous and Discontiguous System Call Patterns [J].
Creech, Gideon ;
Hu, Jiankun .
IEEE TRANSACTIONS ON COMPUTERS, 2014, 63 (04) :807-819
[23]   Host Based Intrusion Detection System [J].
Kothari, Sandip ;
Parmar, Hemant ;
Das, Eshan ;
Panda, Neroja ;
Ahmed, Afrin ;
Marchang, Jims .
2011 INTERNATIONAL CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND AUTOMATION (CCCA 2011), VOL III, 2010, :336-339
[24]   HOST BASED INTRUSION DETECTION SYSTEM [J].
Kothari, Sandip ;
Parmar, Hemant ;
Das, Eshan ;
Panda, Neroja ;
Ahmed, Afrin ;
Marchang, Jims .
2011 INTERNATIONAL CONFERENCE ON MECHANICAL ENGINEERING AND TECHNOLOGY (ICMET 2011), 2011, :875-878
[25]   Mobile Agent-Based Memory Tracer Using Host-Based Intrusion Detection System for Safeguarding Critical Memory [J].
Vijayaragavan, Arun ;
Kumar, P. Mohan ;
Shunmuganathan, K. L. .
INFORMATION SECURITY JOURNAL, 2013, 22 (02) :98-103
[26]   Comparison of anomaly detection accuracy of host-based intrusion detection systems based on different machine learning algorithms [J].
Shin Y. ;
Kim K. .
International Journal of Advanced Computer Science and Applications, 2020, (02) :252-259
[27]   Evaluating Word Embedding Feature Extraction Techniques for Host-Based Intrusion Detection Systems [J].
Paul K. Mvula ;
Paula Branco ;
Guy-Vincent Jourdan ;
Herna L. Viktor .
Discover Data, 1 (1)
[28]   Comparison of Anomaly Detection Accuracy of Host-based Intrusion Detection Systems based on Different Machine Learning Algorithms [J].
Shin, Yukyung ;
Kim, Kangseok .
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (02) :252-259
[29]   Host-based intrusion detection systems adapted from agent-based artificial immune systems [J].
Ou, Chung-Ming .
NEUROCOMPUTING, 2012, 88 :78-86
[30]   Protecting host-based intrusion detectors through virtual machines [J].
Laureano, M. ;
Maziero, C. ;
Jamhour, E. .
COMPUTER NETWORKS, 2007, 51 (05) :1275-1283