2000
DOI: 10.3233/jcs-2000-82-305
|View full text |Cite
|
Sign up to set email alerts
|

Fixed- vs. variable-length patterns for detecting suspicious process behavior

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2000
2000
2011
2011

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 17 publications
(10 citation statements)
references
References 8 publications
0
10
0
Order By: Relevance
“…The according proof of concept is implemented as three C++ files. Listing 1 depicts the target program which is the subject of our attack 4 . In line 6, we create a function pointer pointing to a function named isValidUser(), implemented in a dynamic link library.…”
Section: Example Of Dynamically Altering Control-flowmentioning
confidence: 99%
See 1 more Smart Citation
“…The according proof of concept is implemented as three C++ files. Listing 1 depicts the target program which is the subject of our attack 4 . In line 6, we create a function pointer pointing to a function named isValidUser(), implemented in a dynamic link library.…”
Section: Example Of Dynamically Altering Control-flowmentioning
confidence: 99%
“…The original control-flow is depicted as solid-lined arrows in Figure 3. 3 While our proof of concept presented here regards to the Linux operating system, we also have an equivalent version running on Windows. 4 In the field of offline computer games, software that implements such features in order to alter game specific values (e.g. health, energy, ammunition, etc.)…”
Section: Example Of Dynamically Altering Control-flowmentioning
confidence: 99%
“…Section 2 describes the basic principles of detecting suspicious process behavior by analyzing the sequences of system calls a process can generate. Readers familiar with the previous work on this topic [2,3,8,10,11,13,14,15] can skip this section and go directly to Section 3 where our novel intrusion-detection method, which uses variable-length patterns, is presented. Section 4 compares our novel method with the one proposed by Forrest et al [8,10] based on experiments performed in a testbed [5] environment.…”
Section: Introductionmentioning
confidence: 99%
“…In [6] stide is applied for detecting anomalies in programs audited using Sun's Basic Security Module (BSM). In [14] and [19] the idea of combining sequences of different lengths is exploited. Finally, in [3] the benefits of using an adaptive sequence length are demonstrated.…”
Section: Detectionmentioning
confidence: 99%