A fast automaton-based method for detecting anomalous program behaviors
Top Cited Papers
- 13 November 2002
- proceedings article
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- Vol. 6, 144-155
- https://doi.org/10.1109/secpri.2001.924295
Abstract
No abstract availableThis publication has 11 references indexed in Scilit:
- Detecting intrusions using system calls: alternative data modelsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Penetration state transition analysis: A rule-based intrusion detection approachPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Automated detection of vulnerabilities in privileged programs by execution monitoringPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Intrusion detection. Applying machine learning to Solaris audit dataPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- NetSTAT: a network-based intrusion detection approachPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Detecting anomalous and unknown intrusions against programsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Using kernel hypervisors to secure applicationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary ReportPublished by Springer Nature ,2000
- Intrusion detection via system call tracesIEEE Software, 1997
- State transition analysis: a rule-based intrusion detection approachIEEE Transactions on Software Engineering, 1995