1 |
Gao D , Reiter K M , Song D . On gray-box program tracking for anomaly detection.In: Proceedings of the 13th USENIX Security Symposium, San Diego, August 2004
|
2 |
Gao D , Reiter K M , Song D . Gray-box extraction of execution graphs for anomaly detection.In: Proceedings of the 11th ACM Conference on Computer and Communications Security(CCS), Washington DC, October 2004
|
3 |
Forrest S , Hofmeyr S A , Somayaji A , et al . A sense of self for unix processes.In: IEEE Symposium on Computer Security and Privacy, Los Alamos,CA, May 1996
|
4 |
Forrest S , Hofmeyr S A , Somayaji A . Intrusion detection using sequences of system calls. Journal of Computer Security, 1996(6):151~180
|
5 |
Helman P , Bhangoo J . A statistically based system forprioritizing information exploration under uncertainty. IEEE Transactions on Systems, 1997(7):449~466
|
6 |
Lee W , Stolfo S J , Chan P K . Learning patterns from Unix process execution traces for intrusion detection. AAAI Workshop on AI Approaches to Fraud Detection and Risk Management, July 1997
|
7 |
Warrender C , Forrest S , Pearlmutter B , et al . Detecting intrusions using system calls:alternative data models.In: IEEE Symposium on Security and Privacy, Los Alamos,CA, 1999
|
8 |
Sekar R , Bendre M , Bollineni P , et al . A fast automaton- based method for detecting anomalous program behaviors.In: IEEE Symposium on Security and Privacy, Oakland,CA, May 2001
|
9 |
Mutz D , Valeur F , Kruegel C , et al . Anomalous system call detection on the detection of anomalous system call arguments. ACM Transactions on Information and System Security, 2006(9)
|
10 |
Xu H , Du W , Chapin S , et al . Context sensitive anomaly monitoring of process control flow to detect mimicry attacks and impossible paths.In: Symposium on Recent Advances in Intrusion Detection (RAID), France, September 2004
|
11 |
Wagner D , Soto P . Mimicry attacks on host-based intrusion detection systems.In: ACM Conference on Computer and Communications Security, Washington, November 2002
|
12 |
Wespi A , Dacier M , Debar H , . Intrusion detection using variable-length audit trail patterns.In: 3rd International Workshop on the Recent Advances in Intrusion Detection, Toulouse, October 2000
|
13 |
Wespi A , Dacier M , Debar H , et al . Audit trail pattern analysis for detecting suspicious process behavior.In: Proceedings of RAID 98,Workshop on Recent Advances in Intrusion Detection, Belgium, September 1998
|
14 |
Wespi A , Dacier M , Debar H . An intrusion-detection system based on the teiresias pattern-discovery algorithm. European Institute for Computer Anti-Virus Research, February 1999
|
15 |
Sujatha P K , Kannan A D , Ragunath S . A behavior based approach to host-level intrusion detection using self-organizing maps. Emerging Trends in Engineering and Technology, 2008
|
16 |
Feng H H , Kolesnikov M O , Fogla P . Anomaly detection using call stack information.In: IEEE Symposium on Security and Privacy, Berkeley, May 2003
|
17 |
Lee W , Stolfo S . Data mining approaches for intrusion detection.In: 7th USENIX Security Symposium, San Antonio, January 1998
|
18 |
Wagner D , Dean D . Intrusion detection via static analysis.In: IEEE Symposium on Security and Privacy, Oakland, May 2001
|
19 |
McKelin U , Greens S J , Twycross J . Immune system approaches to intrusion detection-a review.In: Proc of the Third International Conference on Artificial Immune Systems, Catania,Italy, September 2004
|