On Detection of Erratic Arguments

نویسندگان

  • Jin Han
  • Qiang Yan
  • Robert H. Deng
  • Debin Gao
چکیده

Due to the erratic nature, the value of a function argument in one normal program execution could become illegal in another normal execution context. Attacks utilizing such erratic arguments are able to evade detections as fine-grained context information is unavailable in many existing detection schemes. In order to obtain such fine-grained context information, a precise model on the internal program states has to be built, which is impractical especially monitoring a closed source program alone. In this paper, we propose an intrusion detection scheme which builds on two diverse programs providing semantically-close functionality. Our model learns underlying semantic correlation of the argument values in these programs, and consequently gains more accurate context information compared to existing schemes. Through experiments, we show that such context information is effective in detecting attacks which manipulate erratic arguments with comparable false positive rates.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Shift of “Certainty” in Pre- and Post-Citation Arguments: The Case of Textbooks in Applied Linguistics

Writing academic texts by novice researchers requires a framework and support by learning how to cite the works of others. However, compared to the studies on other academic writings, studying citations by considering certainty markers has received little attention. The main purpose of this study was to investigate the shifts of certainty markers (hedges and boosters) in pre- and post-citation ...

متن کامل

The robust construction of a generalized Voronoi graph (GVG) using partial range data for guide robots

Purpose – The purpose of this paper is to describe research to enable a robust navigation of guide robots in erratic environments with partial sensor information. Design/methodology/approach – Two techniques were developed. One is a robust node discrimination method by using an adaptive sensor matching method. The other is a robot navigation technique with partial sensor information. Findings –...

متن کامل

Functional programming and erratic non-determinism

Non-deterministic programs can represent specifications, and non-determinism arises naturally in concurrent programming languages. In this dissertation, λ-calculi exhibiting erratic nondeterminism are studied in order to identify definitions and techniques that may be applicable to higher-order programming languages for specification or concurrency. The non-deterministic λ-calculi arise as frag...

متن کامل

یافتن الگوهای مکرّر در قرآن کریم به‌‌کمک روش‌‌های متن‌‌کاوی

Quran’s Text differs from any other texts in terms of its exceptional concepts, ideas and subjects. To recognize the valuable implicit patterns through a vast amount of data has lately captured the attention of so many researchers. Text Mining provides the grounds to extract information from texts and it can help us reach our objective in this regard. In recent years, Text Mining on Quran and e...

متن کامل

“Effect Of Biofuel Upon Global Warming, Climate And Production Of Crops” A Case Study Of Eastern Uttar Pradesh (India)

Now in these days’ green house gases is the main cause of global warming and affects the climate in the world. Environmental arguments centre on the need to reduce greenhouse gases (GHGs) emissions for the sake of both the global and local climate, particularly in large cities. Excessive exploitation of natural resources for development has been resulted into many environmental problems like en...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011