Proceedings of the 2000 Workshop on New Security Paradigms 2001
DOI: 10.1145/366173.366197
|View full text |Cite
|
Sign up to set email alerts
|

Characterizing the behavior of a program using multiple-length N-grams

Abstract: Some recent advances in intrusion detection are based on detecting anomalies in program behavior, as characterized by the sequence of kernel calls the program makes. Specifically, traces of kernel calls are collected during a training period. The substrings of fixed length N (for some N) of those traces are called N-grams. The set of N-grams occurring during normal execution has been found to discriminate effectively between normal behavior of a program and the behavior of the program under attack. The N-gram … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
35
0

Year Published

2004
2004
2012
2012

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 84 publications
(38 citation statements)
references
References 8 publications
0
35
0
Order By: Relevance
“…N-gram theory has been largely used in the context of natural language analysis, it also has been used in anomaly detection by Maxion and Tan [6,7], Marceau [8], Wespi [9], and Forrest et al [5]. All these papers present ways of using n-grams for anomaly detection and not for log file reduction.…”
Section: Session Length Reduction Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…N-gram theory has been largely used in the context of natural language analysis, it also has been used in anomaly detection by Maxion and Tan [6,7], Marceau [8], Wespi [9], and Forrest et al [5]. All these papers present ways of using n-grams for anomaly detection and not for log file reduction.…”
Section: Session Length Reduction Methodsmentioning
confidence: 99%
“…To identify the most repetitive session subsequences, we use n-gram theory. N-gram theory has been largely used in the context of natural language processing; it has also been used in anomaly detection [5][6][7][8][9].…”
Section: Introductionmentioning
confidence: 99%
“…The -gram matching rule has been used in a wide variety of settings including natural language processing [40], document classification [47], and program monitoring [5], [20], [24], [36] for intrusion detection. In the latter application, -grams can be applied when the behavior of the protected process (for example, an executing computer program) can be represented as a sequence of letters taken from some alphabet.…”
Section: ) Example: -Gramsmentioning
confidence: 99%
“…A node with label in level is connected to a node with label in level if the last symbols of match the first symbols of (akin to the previous example). A similar graphical construction was used in [69] for determining multiple length -grams. The set of protected traces of length can be retrieved by traversing all possible paths, from the first to the last level, in this graph.…”
Section: ) Example: -Gramsmentioning
confidence: 99%
“…A large number of researchers adopted the system-call approach, some seeking to improve on the original methods [49,54,45,62,29], some applying its method to other problems [68,30,50], and some attempting to defeat the system [74,70]. Sana Security developed a product known as Primary Response based on the technology, which it actively marketed to protect servers.…”
Section: Introductionmentioning
confidence: 99%