Intrusion detection using variable-length audit trail patterns. Wespi, A., Dacier, M., & Debar, H. In Debar, H., Mé, L., & Wu, S., editors, Proceedings of the Third International Workshop on Recent Advances in Intrusion Detection (RAID 2000), volume 1907, of Lecture Notes in Computer Science, pages 110--129, Toulouse, France, October, 2000. Springer Berlin Heidelberg. 00223 bibtex: wespi2000intrusion
Intrusion detection using variable-length audit trail patterns [link]Paper  doi  abstract   bibtex   
Audit trail patterns generated on behalf of a Unix process can be used to model the process behavior. Most of the approaches proposed so far use a table of fixed-length patterns to represent the process model. However, variable-length patterns seem to be more naturally suited to model the process behavior, but they are also more difficult to construct. In this paper, we present a novel technique to build a table of variable-length patterns. This technique is based on Teiresias, an algorithm initially developed for discovering rigid patterns in unaligned biological sequences. We evaluate the quality of our technique in a testbed environment, and compare it with the intrusion-detection system proposed by Forrest et al. [8], which is based on fixed-length patterns. The results achieved with our novel method are significantly better than those obtained with the original method based on fixed-length patterns.
@inproceedings{ wespi_intrusion_2000,
  address = {Toulouse, France},
  series = {Lecture {Notes} in {Computer} {Science}},
  title = {Intrusion detection using variable-length audit trail patterns},
  volume = {1907},
  isbn = {978-3-540-41085-0},
  url = {http://dx.doi.org/10.1007/3-540-39945-3_8},
  doi = {10.1007/3-540-39945-3<sub>8</sub>},
  abstract = {Audit trail patterns generated on behalf of a Unix process can be used to model the process behavior. Most of the approaches proposed so far use a table of fixed-length patterns to represent the process model. However, variable-length patterns seem to be more naturally suited to model the process behavior, but they are also more difficult to construct. In this paper, we present a novel technique to build a table of variable-length patterns. This technique is based on Teiresias, an algorithm initially developed for discovering rigid patterns in unaligned biological sequences. We evaluate the quality of our technique in a testbed environment, and compare it with the intrusion-detection system proposed by Forrest et al. [8], which is based on fixed-length patterns. The results achieved with our novel method are significantly better than those obtained with the original method based on fixed-length patterns.},
  booktitle = {Proceedings of the {Third} {International} {Workshop} on {Recent} {Advances} in {Intrusion} {Detection} ({RAID} 2000)},
  publisher = {Springer Berlin Heidelberg},
  author = {Wespi, Andreas and Dacier, Marc and Debar, Hervé},
  editor = {Debar, Hervé and Mé, Ludovic and Wu, S.Felix},
  month = {October},
  year = {2000},
  note = {00223 bibtex: wespi2000intrusion},
  keywords = {C2 audit trail, Intrusion detection, Teiresias, functionality verification tests, pattern discovery, pattern matching, variable-length patterns},
  pages = {110--129}
}

Downloads: 0