2005
DOI: 10.21236/ada436198
|View full text |Cite
|
Sign up to set email alerts
|

Characterizing the Behavior of a Program Using Multiple-Length N-Grams

Abstract: Some recent advances in intrusion detection are based on detecting anomalies in program behavior, as characterized by the sequence of kernel calls the program makes. Specifically, traces of kernel calls are collected during a training period. The substrings of fixed length N (for some N) of those traces are called N-grams. The set of N-grams occurring during normal execution has been found to discriminate effectively between normal behavior of a program and the behavior of the program under attack. The N-gram … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0
3

Year Published

2006
2006
2018
2018

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 12 publications
(14 citation statements)
references
References 3 publications
(3 reference statements)
0
10
0
3
Order By: Relevance
“…Their results showed that their method could find about 75% of anomalous system calls. Marceau [15] and Cabrera et al [55] undertook similar experiments using different methods. The former uses multiple length n-grams on system logs and shows a high rate (13/20) of finding anomalies with fewer datasets than Forrest and Longstaff, and by analysing the normal dictionary, which stores the permitted sequences of system calls, shows that it was possible to detect anomalies with a detection rate of 75-100%.…”
Section: System Behavioursmentioning
confidence: 99%
See 1 more Smart Citation
“…Their results showed that their method could find about 75% of anomalous system calls. Marceau [15] and Cabrera et al [55] undertook similar experiments using different methods. The former uses multiple length n-grams on system logs and shows a high rate (13/20) of finding anomalies with fewer datasets than Forrest and Longstaff, and by analysing the normal dictionary, which stores the permitted sequences of system calls, shows that it was possible to detect anomalies with a detection rate of 75-100%.…”
Section: System Behavioursmentioning
confidence: 99%
“…Instead it monitors network traffic and compares it against an established baseline, where the baseline identifies what is "normal" for that network, what protocols are generally used, what ports and devices generally connect to each other. It alerts the administrator or user when anomalous or significantly different traffic is detected [13][14][15][16][17]. However, it may miss both known and novel attacks if they are not manifested along the observed dimensions.…”
Section: Introductionmentioning
confidence: 99%
“…In the ensuing work these ideas were extended through application of Hidden Markov Models [21], feed-forward and recursive neural networks [23], rule induction algorithms [65] and Support Vector Machines [9]. As part of this evolution, trie and suffix tree data structures were introduced for storage and analysis of system call n-grams [22,24,66]. Beside system call analysis, n-gram models have recently been applied as part of host-based intrusion detection for identification of malicious code in program binaries and documents [e.g.…”
Section: Related Work and Conclusionmentioning
confidence: 99%
“…N-grams have been extensively used in host-based intrusion detection for modeling traces of system calls [e.g. [19][20][21][22][23][24], but until recently have not been applied in the context of network intrusion detection for n > 1. Tokenized words have been used for anomaly detection using rule-based learning [e.g.…”
mentioning
confidence: 99%
“…The WIDS APs will detect intrusions based on both known attack signatures (such as network probes from NetStumbler or other non-passive "war-driving" programs ) and behavior based signatures (such as an internal MAC address suddenly appearing in an external location on a machine with different OS characteristics than it had previously). WIDS will detect anomalous behavior by tying the signature data into a behavior-based intrusion detection system [6,9].…”
Section: Wids Apmentioning
confidence: 99%