2019
DOI: 10.4197/comp.8-2.7
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced Host-Based Intrusion Detection Using System Call Traces

Abstract: To detect zero-day attacks in modern systems, several host-based intrusion detection systems are proposed using the newly compiled ADFA-LD dataset. These techniques use the system call traces of the dataset to detect anomalies, but generally they suffer either from high computational cost as in window-based techniques or low detection rate as in frequency-based techniques. To enhance the accuracy and speed, we propose a host-based intrusion detection system based on distinct short sequences extraction from tra… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 36 publications
(45 reference statements)
0
1
0
Order By: Relevance
“…The results showed an average accuracy rate of 70 %, with a FPR of 20 %. The authors [14] propose an algorithm to extract distinct short sequences from traces of system calls. Features after extracting are feed to the machine learning model such as SVM, kNN to detect anomalies.…”
Section: System Call-based Hidsmentioning
confidence: 99%
“…The results showed an average accuracy rate of 70 %, with a FPR of 20 %. The authors [14] propose an algorithm to extract distinct short sequences from traces of system calls. Features after extracting are feed to the machine learning model such as SVM, kNN to detect anomalies.…”
Section: System Call-based Hidsmentioning
confidence: 99%