DocumentCode
2831684
Title
Intrusion detection based on cross-correlation of system call sequences
Author
Zhang, Xiaoqiang ; Zhu, Zhongliang ; Fan, Pingzhi
Author_Institution
Inst. of Mobile Commun., Southwest Jiaotong Univ., Chengdu
fYear
2005
fDate
16-16 Nov. 2005
Lastpage
283
Abstract
A new light-weight approach, based on the cross-correlation of system call sequences, is presented to identify normal or intrusive program behavior. The program behavior is represented by the cross-correlation value which can be used to indicate the similarity between two sequences. If two sequences are same, the cross-correlation between them will achieve the maximum value. This method of characterizing program behavior by using cross-correlation offers significant computational advantages over HMM (hidden Markov model) or NN (neural network) methods due to the absence of unnecessary training process. Our experiments using UNM (University of New Mexico) audit data show that the cross-correlation based method can effectively detect intrusive attacks and achieve a low false positive rate
Keywords
invasive software; program diagnostics; cross-correlation; intrusion detection; intrusive program behavior; normal program behavior; system call sequences; Computer networks; Hidden Markov models; Industrial training; Information security; Intrusion detection; Mobile communication; National security; Neural networks; Protection; Telecommunication traffic; cross-correlation; intrusion detection; short sequences; system calls;
fLanguage
English
Publisher
ieee
Conference_Titel
Tools with Artificial Intelligence, 2005. ICTAI 05. 17th IEEE International Conference on
Conference_Location
Hong Kong
ISSN
1082-3409
Print_ISBN
0-7695-2488-5
Type
conf
DOI
10.1109/ICTAI.2005.78
Filename
1562950
Link To Document