Sciweavers

15 search results - page 1 / 3
» Gray-box extraction of execution graphs for anomaly detectio...
Sort
View
SEC
2008
13 years 6 months ago
Anomaly Detection with Diagnosis in Diversified Systems using Information Flow Graphs
Design diversity is a well-known method to ensure fault tolerance. Such a method has also been applied successfully in various projects to provide intrusion detection and tolerance...
Frédéric Majorczyk, Eric Totel, Ludo...
CCS
2004
ACM
13 years 10 months ago
Gray-box extraction of execution graphs for anomaly detection
Debin Gao, Michael K. Reiter, Dawn Xiaodong Song
CSDA
2010
124views more  CSDA 2010»
13 years 4 months ago
Statistical inference on attributed random graphs: Fusion of graph features and content
Abstract: Fusion of information from graph features and content can provide superior inference for an anomaly detection task, compared to the corresponding content-only or graph fe...
John Grothendieck, Carey E. Priebe, Allen L. Gorin
KDD
2003
ACM
155views Data Mining» more  KDD 2003»
14 years 5 months ago
Graph-based anomaly detection
Anomaly detection is an area that has received much attention in recent years. It has a wide variety of applications, including fraud detection and network intrusion detection. A ...
Caleb C. Noble, Diane J. Cook
SP
2003
IEEE
107views Security Privacy» more  SP 2003»
13 years 10 months ago
Anomaly Detection Using Call Stack Information
The call stack of a program execution can be a very good information source for intrusion detection. There is no prior work on dynamically extracting information from call stack a...
Henry Hanping Feng, Oleg M. Kolesnikov, Prahlad Fo...