. Report Date (dd-mm-yyyy) Anomaly-based Intrusion Detection Systems Utilizing System Call Data Skormin, Victor A. Available to General Public
نویسنده
چکیده
Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing this collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704-0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 222024302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DD-MM-YYYY) 3/1/2012 2. REPORT TYPE FINAL REPORT 3. DATES COVERED (From To) February 1, 2009 – November 30, 2011 4. TITLE AND SUBTITLE Anomaly-Based Intrusion Detection Systems Utilizing System Call Data 5a. CONTRACT NUMBER FA9550-09-1-0067 5b. GRANT NUMBER 49527 5c. PROGRAM ELEMENT NUMBER
منابع مشابه
Intrusion Detection Systems Utilizing System Call
Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing this collection of information. Send comments regarding this burden estimate or any other aspect of this coll...
متن کاملUtilizing System Call Data
Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for re 'w'ie'Ning instructions , searching existing data sources, gathering and maintaining the data needed, and completing and reviewing this collection of information. Send comments regarding this burden estim03te or any other aspect of this collection of information, i n...
متن کاملHigh Order Non-stationary Markov Models and Anomaly Propagation Analysis in Intrusion Detection System (ids)
A new concept targeted to decrease false positive rates of anomaly based intrusion detection operating in the system call domain is proposed. To mitigate false positives, network based correlation of collected anomalies from different hosts is suggested, as well as a new means of host-based anomaly detection. The concept of anomaly propagation is based on the premise that false alarms do not pr...
متن کاملThe Search of the “ Gene of Self - Replication ” in Malicious
REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing this collection of information. Send comments regarding this burden estimate or any...
متن کاملAssessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing
Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012