Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/525080.884258acmconferencesArticle/Chapter ViewAbstractPublication PagesspConference Proceedingsconference-collections
Article

A Sense of Self for Unix Processes

Published: 06 May 1996 Publication History

Abstract

A method for anomaly detection is introduced in which ``normal'' is defined by short-range correlations in a process' system calls. Initial experiments suggest that the definition is stable during normal behavior for standard UNIX programs. Further, it is able to detect several common intrusions involving sendmail and lpr. This work is part of a research program aimed at building computer security systems that incorporate the mechanisms and algorithms used by natural immune systems.

Cited By

View all
  • (2020)Re-AnimatorProceedings of the 13th ACM International Systems and Storage Conference10.1145/3383669.3398276(61-74)Online publication date: 30-May-2020
  • (2019)A Survey of Intrusion Detection Systems Leveraging Host DataACM Computing Surveys10.1145/334438252:6(1-35)Online publication date: 14-Nov-2019
  • (2019)System performance anomaly detection using tracing data analysisProceedings of the 2019 5th International Conference on Computer and Technology Applications10.1145/3323933.3324085(169-173)Online publication date: 16-Apr-2019
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SP '96: Proceedings of the 1996 IEEE Symposium on Security and Privacy
May 1996
ISBN:0818674172

Sponsors

Publisher

IEEE Computer Society

United States

Publication History

Published: 06 May 1996

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 01 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2020)Re-AnimatorProceedings of the 13th ACM International Systems and Storage Conference10.1145/3383669.3398276(61-74)Online publication date: 30-May-2020
  • (2019)A Survey of Intrusion Detection Systems Leveraging Host DataACM Computing Surveys10.1145/334438252:6(1-35)Online publication date: 14-Nov-2019
  • (2019)System performance anomaly detection using tracing data analysisProceedings of the 2019 5th International Conference on Computer and Technology Applications10.1145/3323933.3324085(169-173)Online publication date: 16-Apr-2019
  • (2017)A New Meta-Heuristics for Intrusion Detection System Inspired from the Protection System of Social BeesInternational Journal of Information Security and Privacy10.4018/IJISP.201701010211:1(18-34)Online publication date: 1-Jan-2017
  • (2016)Novel intrusion prediction mechanism based on honeypot log similarityNetworks10.1002/nem.192326:3(156-175)Online publication date: 1-May-2016
  • (2015)Semantic System for Attacks and Intrusions DetectionInternational Journal of Digital Crime and Forensics10.4018/IJDCF.20151001027:4(19-32)Online publication date: 1-Oct-2015
  • (2015)URL query string anomaly sensor designed with the bidimensional Haar wavelet transformInternational Journal of Information Security10.1007/s10207-015-0276-y14:6(561-581)Online publication date: 1-Nov-2015
  • (2015)Evaluation of Intrusion Detection Systems in Virtualized Environments Using Attack InjectionProceedings of the 18th International Symposium on Research in Attacks, Intrusions, and Defenses - Volume 940410.1007/978-3-319-26362-5_22(471-492)Online publication date: 2-Nov-2015
  • (2015)The Dark Side of the CodeRevised Selected Papers of the 23rd International Workshop on Security Protocols XXIII - Volume 937910.1007/978-3-319-26096-9_1(1-11)Online publication date: 31-Mar-2015
  • (2015)Intrusion Detection System for Applications Using Linux ContainersProceedings of the 11th International Workshop on Security and Trust Management - Volume 933110.1007/978-3-319-24858-5_8(123-135)Online publication date: 21-Sep-2015
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media