DocumentCode
3340970
Title
Intrusion detection based on system call finite-state automation machine
Author
Yu, Fei ; Xu, Cheng ; Shen, Yue ; An, Ji-yao ; Zhang, Lin-Feng
Author_Institution
Sch. of Comput. & Inf. Eng., Hunan Agric. Univ., Changsha
fYear
2005
fDate
14-17 Dec. 2005
Firstpage
63
Lastpage
68
Abstract
With our human beings entering the information age, information security has already become the new problem as the development of human society. This paper first review the application of system call for intrusion detection, and highlight the problems in few commonly cited papers such as Forrest et al and Sekar et al. Then, propose some improvements for finite-state automation machine algorithm, which are technical sound and original. It uses system calls regarded as input, and creates a finite-state automation machine for the functions in the program. Last, the finite-state automation machine is used to detect the attack. Moreover, It can find the place of the vulnerability which exists in the program. This can help to alter the source program
Keywords
finite state machines; safety systems; security of data; attack detection; finite-state automation machine; intrusion detection; system call; Agricultural engineering; Application software; Automation; Humans; Information security; Intrusion detection; Laboratories; National security; Protection; Safety; Finite-State Automation Machine Algorithm; Information Security; Intrusion Detection; System Calls;
fLanguage
English
Publisher
ieee
Conference_Titel
Industrial Technology, 2005. ICIT 2005. IEEE International Conference on
Conference_Location
Hong Kong
Print_ISBN
0-7803-9484-4
Type
conf
DOI
10.1109/ICIT.2005.1600611
Filename
1600611
Link To Document