[go: up one dir, main page]

Elbaum et al., 1999 - Google Patents

Intrusion detection through dynamic software measurement

Elbaum et al., 1999

View HTML
Document ID
12840382935883544044
Author
Elbaum S
Munson J
Publication year
Publication venue
1st Workshop on Intrusion Detection and Network Monitoring (ID 99)

External Links

Snippet

The thrust of this paper is to present a new real-time approach to detect aberrant modes of system behavior induced by abnormal and unauthorized system activities. The theoretical foundation for the research program is based on the study of the software internal behavior …
Continue reading at www.usenix.org (HTML) (other versions)

Similar Documents

Publication Publication Date Title
Milajerdi et al. Holmes: real-time apt detection through correlation of suspicious information flows
Biermann et al. A comparison of intrusion detection systems
Bace et al. NIST special publication on intrusion detection systems
Nguyen et al. Detecting insider threats by monitoring system call activity
US6963983B2 (en) Method of and system for detecting an anomalous operation of a computer system
Peisert et al. Analysis of computer intrusions using sequences of function calls
US20100100961A1 (en) Intrusion detection system
Tan et al. Hiding intrusions: From the abnormal to the normal and beyond
Myers et al. Towards insider threat detection using web server logs
Xu SARR: a cybersecurity metrics and quantification framework (keynote)
Elbaum et al. Intrusion detection through dynamic software measurement
Kardile Crypto ransomware analysis and detection using process monitor
Jones et al. Application intrusion detection using language library calls
RU2610395C1 (en) Method of computer security distributed events investigation
Holm et al. Success rate of remote code execution attacks: expert assessments and observations
Munson et al. Watcher: The missing piece of the security puzzle
Tariq et al. Identifying the provenance of correlated anomalies
Masri et al. Application-based anomaly intrusion detection with dynamic information flow analysis
Luo et al. Security of HPC Systems: From a Log-analyzing Perspective.
Raut Log based intrusion detection system
Kerschbaum et al. Using internal sensors and embedded detectors for intrusion detection
Laitinen Vulnerabilities in the wild: Detecting vulnerable Web applications at scale
Yampolskiy et al. Computer security: A survey of methods and systems
Elbaum et al. USENIX Technical Program-Paper-1st Workshop on Intrusion Detection and Network Monitoring [Technical Program]
Mahanta et al. Utilizing windows event logs for malware detection using machine learning