Sciweavers

233 search results - page 5 / 47
» The Evolution of System-Call Monitoring
Sort
View
OOIS
2000
Springer
15 years 1 months ago
Information Monitors: An Architecture Based on XML
In this paper we present an approach to allow monitoring of XML documents on the World Wide Web. We describe a distributed information monitoring architecture based on monitor rule...
George Spanoudakis, Andrea Zisman
DIMVA
2011
14 years 28 days ago
Operating System Interface Obfuscation and the Revealing of Hidden Operations
Many software security solutions—including malware analyzers, information flow tracking systems, auditing utilities, and host-based intrusion detectors—rely on knowledge of s...
Abhinav Srivastava, Andrea Lanzi, Jonathon T. Giff...
CCS
2008
ACM
14 years 11 months ago
A practical mimicry attack against powerful system-call monitors
System-call monitoring has become the basis for many hostbased intrusion detection as well as policy enforcement techniques. Mimicry attacks attempt to evade system-call monitorin...
Chetan Parampalli, R. Sekar, Rob Johnson
CONEXT
2006
ACM
15 years 3 months ago
Reformulating the monitor placement problem: optimal network-wide sampling
Confronted with the generalization of monitoring in operational networks, researchers have proposed placement algorithms that can help ISPs deploy their monitoring infrastructure ...
Gion Reto Cantieni, Gianluca Iannaccone, Chadi Bar...
88
Voted
RAID
2007
Springer
15 years 3 months ago
Understanding Precision in Host Based Intrusion Detection
Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin...