Elbaum et al., 1999 - Google Patents
Intrusion detection through dynamic software measurementElbaum et al., 1999
View HTML- Document ID
- 12840382935883544044
- Author
- Elbaum S
- Munson J
- Publication year
- Publication venue
- 1st Workshop on Intrusion Detection and Network Monitoring (ID 99)
External Links
Snippet
The thrust of this paper is to present a new real-time approach to detect aberrant modes of system behavior induced by abnormal and unauthorized system activities. The theoretical foundation for the research program is based on the study of the software internal behavior …
- 238000001514 detection method 0 title description 23
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Biermann et al. | A comparison of intrusion detection systems | |
| Nguyen et al. | Detecting insider threats by monitoring system call activity | |
| Bace et al. | NIST special publication on intrusion detection systems | |
| Bace et al. | Intrusion detection systems | |
| US6963983B2 (en) | Method of and system for detecting an anomalous operation of a computer system | |
| US20100100961A1 (en) | Intrusion detection system | |
| Peisert et al. | Analysis of computer intrusions using sequences of function calls | |
| Tan et al. | Hiding intrusions: From the abnormal to the normal and beyond | |
| Myers et al. | Towards insider threat detection using web server logs | |
| Xu | SARR: a cybersecurity metrics and quantification framework (keynote) | |
| Elbaum et al. | Intrusion detection through dynamic software measurement | |
| Kardile | Crypto ransomware analysis and detection using process monitor | |
| Munson et al. | Watcher: The missing piece of the security puzzle | |
| Jones et al. | Application intrusion detection using language library calls | |
| RU2610395C1 (en) | Method of computer security distributed events investigation | |
| Woo et al. | Assessing vulnerabilities in Apache and IIS HTTP servers | |
| Masri et al. | Application-based anomaly intrusion detection with dynamic information flow analysis | |
| Luo et al. | Security of HPC Systems: From a Log-analyzing Perspective. | |
| Mahanta et al. | Utilizing windows event logs for malware detection using machine learning | |
| Schneidewind | Metrics for mitigating cybersecurity threats to networks | |
| Holm et al. | Success rate of remote code execution attacks: expert assessments and observations | |
| Kerschbaum et al. | Using internal sensors and embedded detectors for intrusion detection | |
| Tariq et al. | Identifying the provenance of correlated anomalies | |
| Raut | Log based intrusion detection system | |
| Laitinen et al. | Vulnerabilities in the wild: Detecting vulnerable Web applications at scale |