Elbaum et al., 1999 - Google Patents
Intrusion detection through dynamic software measurementElbaum et al., 1999
View HTML- Document ID
- 12840382935883544044
- Author
- Elbaum S
- Munson J
- Publication year
- Publication venue
- 1st Workshop on Intrusion Detection and Network Monitoring (ID 99)
External Links
Snippet
The thrust of this paper is to present a new real-time approach to detect aberrant modes of system behavior induced by abnormal and unauthorized system activities. The theoretical foundation for the research program is based on the study of the software internal behavior …
- 238000001514 detection method 0 title description 23
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Milajerdi et al. | Holmes: real-time apt detection through correlation of suspicious information flows | |
Biermann et al. | A comparison of intrusion detection systems | |
Bace et al. | NIST special publication on intrusion detection systems | |
Nguyen et al. | Detecting insider threats by monitoring system call activity | |
US6963983B2 (en) | Method of and system for detecting an anomalous operation of a computer system | |
Peisert et al. | Analysis of computer intrusions using sequences of function calls | |
US20100100961A1 (en) | Intrusion detection system | |
Tan et al. | Hiding intrusions: From the abnormal to the normal and beyond | |
Myers et al. | Towards insider threat detection using web server logs | |
Xu | SARR: a cybersecurity metrics and quantification framework (keynote) | |
Elbaum et al. | Intrusion detection through dynamic software measurement | |
Kardile | Crypto ransomware analysis and detection using process monitor | |
Jones et al. | Application intrusion detection using language library calls | |
RU2610395C1 (en) | Method of computer security distributed events investigation | |
Holm et al. | Success rate of remote code execution attacks: expert assessments and observations | |
Munson et al. | Watcher: The missing piece of the security puzzle | |
Tariq et al. | Identifying the provenance of correlated anomalies | |
Masri et al. | Application-based anomaly intrusion detection with dynamic information flow analysis | |
Luo et al. | Security of HPC Systems: From a Log-analyzing Perspective. | |
Raut | Log based intrusion detection system | |
Kerschbaum et al. | Using internal sensors and embedded detectors for intrusion detection | |
Laitinen | Vulnerabilities in the wild: Detecting vulnerable Web applications at scale | |
Yampolskiy et al. | Computer security: A survey of methods and systems | |
Elbaum et al. | USENIX Technical Program-Paper-1st Workshop on Intrusion Detection and Network Monitoring [Technical Program] | |
Mahanta et al. | Utilizing windows event logs for malware detection using machine learning |