• DocumentCode
    478454
  • Title

    Investigating intrusion detection systems that use trails of system calls

  • Author

    Amer, Suhair Hafez ; Hamilton, John A.

  • Author_Institution
    Dept. of Comput. Sci. & Software Eng., Auburn Univ., Auburn, AL
  • fYear
    2008
  • fDate
    16-18 June 2008
  • Firstpage
    377
  • Lastpage
    384
  • Abstract
    Three intrusion detection systems that use trails of system calls have been investigated. The three techniques used to generate the pattern database have been adapted from sequence method, lookahead-pairs method and variable-length-with-overlap-relationship method. Testing against Trojan horse and denial of service attacks was analyzed. None of the systems is capable of defeating the system-call denial-of-service-attack. Modification is necessary to indicate maximum threshold value for the number of times a pattern may be contiguously repeated. Furthermore, Lookahead-pairs method had the best space cost performance with a window size less than 24.
  • Keywords
    computer networks; security of data; telecommunication network management; telecommunication security; Trojan horse; denial-of-service attacks; intrusion detection system; lookahead-pairs method; maximum threshold; pattern database; sequence method; system call trails; variable-length-with-overlap-relationship method; Computer crime; Computer science; Costs; Databases; Hamming distance; Intrusion detection; Invasive software; Monitoring; Software engineering; Testing; Host-based intrusion detection; lookahead-pairs method; sequence method; variable length with overlap relationship method;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Performance Evaluation of Computer and Telecommunication Systems, 2008. SPECTS 2008. International Symposium on
  • Conference_Location
    Edinburgh
  • Print_ISBN
    978-1-56555-320-0
  • Type

    conf

  • Filename
    4667587