Understanding Precision in Host Based Intrusion Detection
RAID, pp. 21-41, 2007.
Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of control-flow transfers to prevent the execution of attack code. This paper formally analyzes and compares real systems based on these two anomaly detection philosophie...More
PPT (Upload PPT)