Understanding Precision in Host Based Intrusion Detection

RAID, pp. 21-41, 2007.

Cited by: 34|Views27
EI

Abstract:

Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of control-flow transfers to prevent the execution of attack code. This paper formally analyzes and compares real systems based on these two anomaly detection philosophie...More

Code:

Data:

Your rating :
0

 

Tags
Comments