2007
DOI: 10.1016/j.neucom.2006.10.017
|View full text |Cite
|
Sign up to set email alerts
|

Sequence-similarity kernels for SVMs to detect anomalies in system calls

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 27 publications
(8 citation statements)
references
References 5 publications
0
8
0
Order By: Relevance
“…Neither encoding the sequence into features nor applying an algorithm which is made for sequential information (i.e., CRF) outperforms a simple model (i.e., NB). This is in contrast with studies on intrusion detection, where it was shown advantageous to take into account the structure of system calls, utilizing Conditional Random Fields (CRF) [9] and special kernel functions to measure the similarity of sequences [23]. Structured models in terms of special tree kernel functions outperformed n-gram representations when detecting malicious SQL queries [1].…”
Section: Resultsmentioning
confidence: 84%
“…Neither encoding the sequence into features nor applying an algorithm which is made for sequential information (i.e., CRF) outperforms a simple model (i.e., NB). This is in contrast with studies on intrusion detection, where it was shown advantageous to take into account the structure of system calls, utilizing Conditional Random Fields (CRF) [9] and special kernel functions to measure the similarity of sequences [23]. Structured models in terms of special tree kernel functions outperformed n-gram representations when detecting malicious SQL queries [1].…”
Section: Resultsmentioning
confidence: 84%
“…In Wang et al, 20 Swarnkar and Hubballi, 21 and Wang and Stolfo, 22 the sequential IDSs are suggested for the detection of anomalous sequences containing subsections of which their inherent frequency is unexpected. The latest is an IDS known as Rangegram, 23 which effectively produces a Normality model within ordinary sequences of the high-order n-grams with a maximum and minimum range of frequency. In a test sequence, the author analyzed that the n-grams increased from the normal range in case network intrusion.…”
Section: Related Workmentioning
confidence: 99%
“…The sequential IDSs like Tian et al, 23 Michlovskyé t al., 24 and Haddadi 25 analyzed based on the sequences they contain to identify ordinary sequences with much difference. These IDSs use a version of the SSK 26 to implicitly map sequence into a large function space where distances between sequences are equivalent.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Support vector machines are difficult to implement large scale training samples. It will consume a lot of memory and computing time [30] .…”
Section: Introductionmentioning
confidence: 99%