Searching System Call Information for Clues - The Effects of Intrusions on Processes (Paperback)


The United States Air Force extensively uses information systems as a tool for managing and maintaining its information. The increased dependence on these systems in recent years has necessitated the need for protection from threats of information warfare and cyber terrorism. One type of protection utilizes intrusion detection systems to provide indications that intrusive behavior has occurred. Other types of protection may include packet filtering, cryptography and strong user authentication. Traditional approaches toward intrusion detection rely on features that are external to computer processes. By treating processes as black-boxes, intrusion detection systems may miss a wealth of information that could be useful for detecting intrusions. This thesis effort investigates the effectiveness of anomaly-based intrusion detection using system call information from a computational process. Previous work uses sequences of system calls to identify anomalies in processes.

R1,391

Or split into 4x interest-free payments of 25% on orders over R50
Learn more

Discovery Miles13910
Mobicred@R130pm x 12* Mobicred Info
Free Delivery
Delivery AdviceShips in 10 - 15 working days


Toggle WishListAdd to wish list
Review this Item

Product Description

The United States Air Force extensively uses information systems as a tool for managing and maintaining its information. The increased dependence on these systems in recent years has necessitated the need for protection from threats of information warfare and cyber terrorism. One type of protection utilizes intrusion detection systems to provide indications that intrusive behavior has occurred. Other types of protection may include packet filtering, cryptography and strong user authentication. Traditional approaches toward intrusion detection rely on features that are external to computer processes. By treating processes as black-boxes, intrusion detection systems may miss a wealth of information that could be useful for detecting intrusions. This thesis effort investigates the effectiveness of anomaly-based intrusion detection using system call information from a computational process. Previous work uses sequences of system calls to identify anomalies in processes.

Customer Reviews

No reviews or ratings yet - be the first to create one!

Product Details

General

Imprint

Biblioscholar

Country of origin

United States

Release date

December 2012

Availability

Expected to ship within 10 - 15 working days

First published

December 2012

Authors

Dimensions

246 x 189 x 6mm (L x W x T)

Format

Paperback - Trade

Pages

116

ISBN-13

978-1-288-39877-5

Barcode

9781288398775

Categories

LSN

1-288-39877-8



Trending On Loot