2012 Colloquium in Information Science and Technology 2012
DOI: 10.1109/cist.2012.6388070
|View full text |Cite
|
Sign up to set email alerts
|

Host intrusion detection for long stealthy system call sequences

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…Their work was evaluated on KDD98, UNM and self-generated ADFA LD data set during the research. Elgraini et al (2012) proposed an unsupervised Naive Bayes based classifier model on long stealthy system call sequences approach. Lengyel et al (2014) proposed the Drakvuf tool for dynamic malware analysis system through the introspection facility of Xen hypervisor.…”
Section: Existing Workmentioning
confidence: 99%
“…Their work was evaluated on KDD98, UNM and self-generated ADFA LD data set during the research. Elgraini et al (2012) proposed an unsupervised Naive Bayes based classifier model on long stealthy system call sequences approach. Lengyel et al (2014) proposed the Drakvuf tool for dynamic malware analysis system through the introspection facility of Xen hypervisor.…”
Section: Existing Workmentioning
confidence: 99%
“…Elgraini et al [39] estimate the probability of a sequence of calls conditioned on the class (normal/attack) using a first order Markov model-P (s 1 , s 2 , ...|C) = P (s 1 |C)P (s 2 |s 1 , C).... Finally, a NB approach is used to find the most likely class.…”
Section: Sequential Features (N-grams)mentioning
confidence: 99%
“…The original dataset size is 9.3GB, and the 6% dataset size is 4.2GB. [134] University of New Mexico dataset (UNM) In 2004, the UNM dataset was released consisting of four datasets of systems calls executed by active processes; "Synthetic Sendmail UNM, Synthetic Sendmail CERT, live lpr UNM, and live lpr MIT" [39]. Several programs are included "(e.g., programs that run as daemons and those that do not), programs that vary widely in their size and complexity, and different kinds of intrusions (buffer overflows, symbolic link attacks, and Trojan programs).…”
Section: Supplementary Section: Datasetsmentioning
confidence: 99%