INTRUSION DETECTION VIA SYSTEM CALL TRACES

Citation
Ap. Kosoresow et Sa. Hofmeyr, INTRUSION DETECTION VIA SYSTEM CALL TRACES, IEEE software, 14(5), 1997, pp. 35
Citations number
10
Categorie Soggetti
Computer Sciences","Computer Science Software Graphycs Programming
Journal title
ISSN journal
07407459
Volume
14
Issue
5
Year of publication
1997
Database
ISI
SICI code
0740-7459(1997)14:5<35:IDVSCT>2.0.ZU;2-4
Abstract
Computer use leaves trails of activity that can reveal signatures of m isuse as well as of legitimate activity. Depending on the audit method used, one can record a user's keystrokes, the system resources used, or the system calls made by some collection of processes. The authors have done preliminary work on the analysis of system call traces, part icularly their structure during normal and anomalous behavior, and hav e found the anomalies to be temporally localized. These techniques cou ld eventually lead to an effective, automatic analysis and monitoring system, and might even be extensible to handle other kinds of anomalou s behavior.