Detecting Intrusions Using System Calls: Alternative Data Models
Author
Christina Warrender, Stephanie Forrest, Barak Pearlmutter
Abstract
Intrusion detection systems rely on a wide variety of observable data to distinguish between legitimate and illegitimate activities. In this paper we study one such observable - sequences of system calls into the kernel of an operating system...
Publication Date
0000-00-00
Location
A hard-copy of this is in the Papers Cabinet