Host-based intrusion detection system: Model and design features

被引:1
作者
Zegzhda, Pyotr [1 ]
Kort, Sernyon [1 ]
机构
[1] St Petersburg Polytechn Univ, St Petersburg, Russia
来源
COMPUTER NETWORK SECURITY, PROCEEDINGS | 2007年 / 1卷
关键词
intrusion detection; host-based intrusion detection system; attack; API Intercept;
D O I
10.1007/978-3-540-73986-9_29
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article reports on a model of a host-based intrusion detection system. Using a model of a state machine possible mechanisms of security violations in a computer system are analyzed. Thereafter principles are suggested for building an analysis module based on a model of dynamic monitoring of system statuses. The article concludes with a number of approaches for developing a data acquisition module for a host-based intrusion detection system.
引用
收藏
页码:340 / +
页数:2
相关论文
共 50 条
[31]   Intrusion detection model of host system call sequence based on neighbor algorithm [J].
Wang, Z ;
Peng, XG .
ISTM/2005: 6TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-9, CONFERENCE PROCEEDINGS, 2005, :519-522
[32]   Host-Based Data Exfiltration Detection via System Call Sequences [J].
Jewell, Brian ;
Beaver, Justin .
PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2011, :134-142
[33]   Towards Profiling Program Instances in Host-Based Intrusion Detection Systems by Recognizing Software Update Patterns [J].
Koivunen, Lauri ;
Rauti, Sampsa ;
Leppanen, Ville .
11TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS (SIN 2018), 2018,
[34]   Host-based IDS: A review and open issues of an anomaly detection system in IoT [J].
Martins, Ines ;
Resende, Joao S. ;
Sousa, Patricia R. ;
Silva, Simao ;
Antunes, Luis ;
Gama, Joao .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 133 :95-113
[35]   Research on Intrusion Detection System Based on Host Information Recognition [J].
Sui, Xin .
PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, INFORMATION AND MECHANICAL ENGINEERING (EMIM 2017), 2017, 76 :481-483
[36]   Intrusion Detection System Based on data mining for Host Log [J].
Zhu, Ming ;
Huang, ZiLi .
2017 IEEE 2ND ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC), 2017, :1742-1746
[37]   Multivariate Linear Regression Model for Host Based Intrusion Detection [J].
Gautam, Sunil Kumar ;
Om, Hari .
COMPUTATIONAL INTELLIGENCE IN DATA MINING, VOL 3, 2015, 33
[38]   HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices [J].
Breitenbacher, Dominik ;
Homoliak, Ivan ;
Aung, Yan Lin ;
Tippenhauer, Nils Ole ;
Elovici, Yuval .
PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19), 2019, :479-484
[39]   A Host-based Anomaly Detection Approach by Representing System Calls as States of Kernel Modules [J].
Murtaza, Syed Shariyar ;
Khreich, Wael ;
Hamou-Lhadj, Abdelwahab ;
Couture, Mario .
2013 IEEE 24TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE), 2013, :431-440
[40]   Intrusion detection system evaluation model based on model checking [J].
Xu, Pengtao ;
Zhu, Weijun .
PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS (AMEII 2016), 2016, 73 :723-727