On Preventing Intrusions by Process Behavior Monitoring

نویسندگان

  • R. Sekar
  • Thomas F. Bowen
  • Mark E. Segal
چکیده

Class Different levels of abstraction may be desired in different contexts, and hence there may be overlaps among different user-defined abstract events. For instance, we may have an abstract event that corresponds to readOpen, and another that corresponds to any open, regardless of whether it is for reading or writing. For simplicity, we restrict the definition of abstract events to be primitive event patterns.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Embedded Monitors for Detecting and Preventing Intrusions in Cryptographic and Application Protocols

Intrusion Detection Systems (IDS) are responsible detecting intrusions in order to protect information from unauthorized access or manipulation. There are two main approaches for intrusion detection: signature-based and anomaly-based. Signature-based detection employs pattern matching to match attack signatures with observed data making it ideal for detecting known attacks. However, it cannot d...

متن کامل

Gray-Box Anomaly Detection using System Call Monitoring

Many host-based anomaly detection systems monitor a process by observing the system calls it makes, and comparing these calls to a model of normal behavior for the program that the process is executing. In this thesis we explore two novel approaches for constructing the normal behavior model for anomaly detection. We introduce execution graph, which is the first model that both requires no stat...

متن کامل

Preventing Ransomware Attacks Through File System Filter Drivers

Over the last years ransomware attacks have been widely spreading over the Internet, indiscriminately targeting home users as well as corporates and public agencies. Several approaches have been proposed to analyze and detect ransomware intrusions in literature, moving from combined heuristics, behavior analysis, sandboxbased solutions and machine learning techniques to function calls monitorin...

متن کامل

Preventing Key Performance Indicators Violations Based on Proactive Runtime Adaptation in Service Oriented Environment

Key Performance Indicator (KPI) is a type of performance measurement that evaluates the success of an organization or a partial activity in which it engages. If during the running process instance the monitoring results show that the KPIs do not reach their target values, then the influential factors should be identified, and the appropriate adaptation strategies should be performed to prevent ...

متن کامل

Learning Program Behavior Pro les for Intrusion Detection

Pro ling the behavior of programs can be a useful reference for detecting potential intrusions against systems This paper presents three anomaly detec tion techniques for pro ling program behavior that evolve from memorization to generalization The goal of monitoring program behavior is to be able to detect potential intrusions by noting irregularities in program behavior The techniques start f...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999