• DocumentCode
    2831684
  • Title

    Intrusion detection based on cross-correlation of system call sequences

  • Author

    Zhang, Xiaoqiang ; Zhu, Zhongliang ; Fan, Pingzhi

  • Author_Institution
    Inst. of Mobile Commun., Southwest Jiaotong Univ., Chengdu
  • fYear
    2005
  • fDate
    16-16 Nov. 2005
  • Lastpage
    283
  • Abstract
    A new light-weight approach, based on the cross-correlation of system call sequences, is presented to identify normal or intrusive program behavior. The program behavior is represented by the cross-correlation value which can be used to indicate the similarity between two sequences. If two sequences are same, the cross-correlation between them will achieve the maximum value. This method of characterizing program behavior by using cross-correlation offers significant computational advantages over HMM (hidden Markov model) or NN (neural network) methods due to the absence of unnecessary training process. Our experiments using UNM (University of New Mexico) audit data show that the cross-correlation based method can effectively detect intrusive attacks and achieve a low false positive rate
  • Keywords
    invasive software; program diagnostics; cross-correlation; intrusion detection; intrusive program behavior; normal program behavior; system call sequences; Computer networks; Hidden Markov models; Industrial training; Information security; Intrusion detection; Mobile communication; National security; Neural networks; Protection; Telecommunication traffic; cross-correlation; intrusion detection; short sequences; system calls;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Tools with Artificial Intelligence, 2005. ICTAI 05. 17th IEEE International Conference on
  • Conference_Location
    Hong Kong
  • ISSN
    1082-3409
  • Print_ISBN
    0-7695-2488-5
  • Type

    conf

  • DOI
    10.1109/ICTAI.2005.78
  • Filename
    1562950