Bridging the Gap between Data-Flow and Control-Flow Analysis for Anomaly Detection
Host-based anomaly detectors monitor the control-flow and data-flow behavior of system calls to detect intrusions. Control-flow-based detectors monitor the sequence of system calls, while data-flow-based detectors monitor the data propagation among arguments of system calls. Besides pointing out tha...
Saved in:
Main Authors: | LI, Peng, PARK, Hyundo, GAO, Debin, Fu, Jianming |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2008
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/441 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
On Detection of Erratic Arguments
by: HAN, Jin, et al.
Published: (2011) -
Towards Ground Truthing Observations in Gray-Box Anomaly Detection
by: MING, Jiang, et al.
Published: (2011) -
Behavioral Distance Measurement using Hidden Markov Models
by: GAO, Debin, et al.
Published: (2006) -
SafeStack+: Enhanced dual stack to combat data-flow hijacking
by: LIN, Yan, et al.
Published: (2017) -
Phase Fourier Reconstruction for Anomaly Detection on Metal Surface Using Salient Irregularity
by: Hung, Tzu-Yi, et al.
Published: (2017)