{"title":"基于系统调用序列互相关的入侵检测","authors":"Xiaoqiang Zhang, Zhongliang Zhu, P. Fan","doi":"10.1109/ICTAI.2005.78","DOIUrl":null,"url":null,"abstract":"A new light-weight approach, based on the cross-correlation of system call sequences, is presented to identify normal or intrusive program behavior. The program behavior is represented by the cross-correlation value which can be used to indicate the similarity between two sequences. If two sequences are same, the cross-correlation between them will achieve the maximum value. This method of characterizing program behavior by using cross-correlation offers significant computational advantages over HMM (hidden Markov model) or NN (neural network) methods due to the absence of unnecessary training process. Our experiments using UNM (University of New Mexico) audit data show that the cross-correlation based method can effectively detect intrusive attacks and achieve a low false positive rate","PeriodicalId":294694,"journal":{"name":"17th IEEE International Conference on Tools with Artificial Intelligence (ICTAI'05)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Intrusion detection based on cross-correlation of system call sequences\",\"authors\":\"Xiaoqiang Zhang, Zhongliang Zhu, P. Fan\",\"doi\":\"10.1109/ICTAI.2005.78\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A new light-weight approach, based on the cross-correlation of system call sequences, is presented to identify normal or intrusive program behavior. The program behavior is represented by the cross-correlation value which can be used to indicate the similarity between two sequences. If two sequences are same, the cross-correlation between them will achieve the maximum value. This method of characterizing program behavior by using cross-correlation offers significant computational advantages over HMM (hidden Markov model) or NN (neural network) methods due to the absence of unnecessary training process. Our experiments using UNM (University of New Mexico) audit data show that the cross-correlation based method can effectively detect intrusive attacks and achieve a low false positive rate\",\"PeriodicalId\":294694,\"journal\":{\"name\":\"17th IEEE International Conference on Tools with Artificial Intelligence (ICTAI'05)\",\"volume\":\"129 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-11-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"17th IEEE International Conference on Tools with Artificial Intelligence (ICTAI'05)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICTAI.2005.78\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"17th IEEE International Conference on Tools with Artificial Intelligence (ICTAI'05)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICTAI.2005.78","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Intrusion detection based on cross-correlation of system call sequences
A new light-weight approach, based on the cross-correlation of system call sequences, is presented to identify normal or intrusive program behavior. The program behavior is represented by the cross-correlation value which can be used to indicate the similarity between two sequences. If two sequences are same, the cross-correlation between them will achieve the maximum value. This method of characterizing program behavior by using cross-correlation offers significant computational advantages over HMM (hidden Markov model) or NN (neural network) methods due to the absence of unnecessary training process. Our experiments using UNM (University of New Mexico) audit data show that the cross-correlation based method can effectively detect intrusive attacks and achieve a low false positive rate