Host-based intrusion detection system: Model and design features

被引:1
作者
Zegzhda, Pyotr [1 ]
Kort, Sernyon [1 ]
机构
[1] St Petersburg Polytechn Univ, St Petersburg, Russia
来源
COMPUTER NETWORK SECURITY, PROCEEDINGS | 2007年 / 1卷
关键词
intrusion detection; host-based intrusion detection system; attack; API Intercept;
D O I
10.1007/978-3-540-73986-9_29
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article reports on a model of a host-based intrusion detection system. Using a model of a state machine possible mechanisms of security violations in a computer system are analyzed. Thereafter principles are suggested for building an analysis module based on a model of dynamic monitoring of system statuses. The article concludes with a number of approaches for developing a data acquisition module for a host-based intrusion detection system.
引用
收藏
页码:340 / +
页数:2
相关论文
共 50 条
  • [21] A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguous and Discontiguous System Call Patterns
    Creech, Gideon
    Hu, Jiankun
    IEEE TRANSACTIONS ON COMPUTERS, 2014, 63 (04) : 807 - 819
  • [22] Host Based Intrusion Detection System
    Kothari, Sandip
    Parmar, Hemant
    Das, Eshan
    Panda, Neroja
    Ahmed, Afrin
    Marchang, Jims
    2011 INTERNATIONAL CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND AUTOMATION (CCCA 2011), VOL III, 2010, : 336 - 339
  • [23] HOST BASED INTRUSION DETECTION SYSTEM
    Kothari, Sandip
    Parmar, Hemant
    Das, Eshan
    Panda, Neroja
    Ahmed, Afrin
    Marchang, Jims
    2011 INTERNATIONAL CONFERENCE ON MECHANICAL ENGINEERING AND TECHNOLOGY (ICMET 2011), 2011, : 875 - 878
  • [24] Mobile Agent-Based Memory Tracer Using Host-Based Intrusion Detection System for Safeguarding Critical Memory
    Vijayaragavan, Arun
    Kumar, P. Mohan
    Shunmuganathan, K. L.
    INFORMATION SECURITY JOURNAL, 2013, 22 (02): : 98 - 103
  • [25] Comparison of anomaly detection accuracy of host-based intrusion detection systems based on different machine learning algorithms
    Shin Y.
    Kim K.
    International Journal of Advanced Computer Science and Applications, 2020, (02): : 252 - 259
  • [26] Evaluating Word Embedding Feature Extraction Techniques for Host-Based Intrusion Detection Systems
    Paul K. Mvula
    Paula Branco
    Guy-Vincent Jourdan
    Herna L. Viktor
    Discover Data, 1 (1):
  • [27] Comparison of Anomaly Detection Accuracy of Host-based Intrusion Detection Systems based on Different Machine Learning Algorithms
    Shin, Yukyung
    Kim, Kangseok
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (02) : 252 - 259
  • [28] Host-based intrusion detection systems adapted from agent-based artificial immune systems
    Ou, Chung-Ming
    NEUROCOMPUTING, 2012, 88 : 78 - 86
  • [29] Protecting host-based intrusion detectors through virtual machines
    Laureano, M.
    Maziero, C.
    Jamhour, E.
    COMPUTER NETWORKS, 2007, 51 (05) : 1275 - 1283
  • [30] Intrusion detection model of host system call sequence based on neighbor algorithm
    Wang, Z
    Peng, XG
    ISTM/2005: 6TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-9, CONFERENCE PROCEEDINGS, 2005, : 519 - 522