1998
DOI: 10.1007/bfb0055852
|View full text |Cite
|
Sign up to set email alerts
|

Fixed vs. variable-length patterns for detecting suspicious process behavior

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0
1

Year Published

1999
1999
2012
2012

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(19 citation statements)
references
References 3 publications
0
18
0
1
Order By: Relevance
“…Some mechanisms of error detection are directed towards both non-malicious and malicious faults (e.g., memory access protection techniques). Intrusion detection is usually performed via likelihood checks [Forrest et al 1996, Debar et al 1998]. Approaches and schemes have been proposed for tolerating:…”
Section: Implementation Of Fault Tolerancementioning
confidence: 99%
“…Some mechanisms of error detection are directed towards both non-malicious and malicious faults (e.g., memory access protection techniques). Intrusion detection is usually performed via likelihood checks [Forrest et al 1996, Debar et al 1998]. Approaches and schemes have been proposed for tolerating:…”
Section: Implementation Of Fault Tolerancementioning
confidence: 99%
“…Specifically, the authors use Hotelling's T 2 distributions to detect outliers in series of records coming from generic information systems (e.g., log files generated by a web server). Knowledge-based techniques include all classification techniques based on deductive reasoning as well as specification-based intrusion detection approaches [63][64][65]. For example, Wespi et al describe Unix process behaviors by modeling either the system calls or the generated audit events.…”
Section: )mentioning
confidence: 99%
“…For example, host-based intrusion detection commonly analyzes system calls [63,64,75], software data structures [76,77], and application execution flows [78]. On the other hand, network-based intrusion detection generally focuses on network communications and, often, on single network messages.…”
Section: Feature Selectionmentioning
confidence: 99%
See 2 more Smart Citations