Fixed-vs. variable-length patterns for detecting suspicious process behavior. Wespi, A., Debar, H., Dacier, M., & Nassehi, M. Journal of Computer Security, 8(2, 3):159--181, August, 2000. bibtex: wespi2000fixed bibtex[issue_date=August 2000;numpages=23;acmid=1297830]
Fixed-vs. variable-length patterns for detecting suspicious process behavior [link]Paper  abstract   bibtex   
This paper addresses the problem of creating patterns that can be used to model the normal behavior of a given process. The models can be used for intrusion-detection purposes. First, we present a novel method to generate input data sets that enable us to observe the normal behavior of a process in a secure environment. Second, we propose various techniques to derive either fixed-length or variable-length patterns from the input data sets. We show the advantages and drawbacks of each technique, based on the results of the experiments we have run on our testbed.
@article{ wespi_fixed-vs._2000,
  title = {Fixed-vs. variable-length patterns for detecting suspicious process behavior},
  volume = {8},
  issn = {0926-227X},
  url = {http://dl.acm.org/citation.cfm?id=1297828.1297830},
  abstract = {This paper addresses the problem of creating patterns that can be used to model the normal behavior of a given process. The models can be used for intrusion-detection purposes. First, we present a novel method to generate input data sets that enable us to observe the normal behavior of a process in a secure environment. Second, we propose various techniques to derive either fixed-length or variable-length patterns from the input data sets. We show the advantages and drawbacks of each technique, based on the results of the experiments we have run on our testbed.},
  number = {2, 3},
  journal = {Journal of Computer Security},
  author = {Wespi, Andreas and Debar, Hervé and Dacier, Marc and Nassehi, Mehdi},
  month = {August},
  year = {2000},
  note = {bibtex: wespi2000fixed 
bibtex[issue_date=August 2000;numpages=23;acmid=1297830]},
  keywords = {Intrusion detection, anomaly detection},
  pages = {159--181}
}

Downloads: 0