2012 IEEE 12th International Conference on Computer and Information Technology 2012
DOI: 10.1109/cit.2012.223
|View full text |Cite
|
Sign up to set email alerts
|

Improved Edit Distance Method for System Call Anomaly Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…These editing distances cover partially the above-mentioned difficulties and have been used with great success to evaluate similarities and dissimilarities in sequences of nucleotides, some of them allowing for the isolation of abnormal subsequences [7]. In addition, they have been successfully adapted to cope with sequences of system calls [8]. However, the quadratic time complexity of most of these similarity measures and the need for the computation of the whole similarity matrix limit their use to small to medium size problems.…”
Section: Introductionmentioning
confidence: 99%
“…These editing distances cover partially the above-mentioned difficulties and have been used with great success to evaluate similarities and dissimilarities in sequences of nucleotides, some of them allowing for the isolation of abnormal subsequences [7]. In addition, they have been successfully adapted to cope with sequences of system calls [8]. However, the quadratic time complexity of most of these similarity measures and the need for the computation of the whole similarity matrix limit their use to small to medium size problems.…”
Section: Introductionmentioning
confidence: 99%
“…To determine whether a behavior is abnormal, existing studies quantify detection results with statistical or probabilistic methods by comparing with the normal pattern. Similarly, there are many algorithms, such as Bayesian reference, 15 edit distance, 16 Markov transfer, 10 fuzzy logic, 17 and kernel. 18 Note that the storage structure of patterns makes a significant impact on the performance of the detection algorithms.…”
Section: Introductionmentioning
confidence: 99%