

de Recherche et d’Innovation
en Cybersécurité et Société
Murtaza, S. S.; Khreich, W.; Hamou-Lhadj, A.; Gagnon, S.
A trace abstraction approach for host-based anomaly detection Article d'actes
Dans: 2015 IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2015 - Proceedings, p. 170–177, Institute of Electrical and Electronics Engineers Inc., 2015, ISBN: 978-146737557-3 (ISBN), (Journal Abbreviation: IEEE Symp. Comput. Intell. Secur. Def. Appl., CISDA - Proc.).
Résumé | Liens | BibTeX | Étiquettes: Abstracting, Abstraction techniques, Alarm systems, Anomaly detection, Anomaly detection systems, Anomaly detector, Artificial intelligence, Chemical detection, Computer programming languages, Distributed computer systems, Errors, Hidden Markov models, Host-based Anomaly Detection System, Markov processes, Signal detection, Software dependability, Software security, System call traces, Time delay, Time delay embedding, Trace analysis, Trace Analysis and Abstraction
@inproceedings{murtaza_trace_2015,
title = {A trace abstraction approach for host-based anomaly detection},
author = {S. S. Murtaza and W. Khreich and A. Hamou-Lhadj and S. Gagnon},
url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84953310135&doi=10.1109%2fCISDA.2015.7208644&partnerID=40&md5=30e47f711b04bc6c44be9f6daea5ebf1},
doi = {10.1109/CISDA.2015.7208644},
isbn = {978-146737557-3 (ISBN)},
year = {2015},
date = {2015-01-01},
booktitle = {2015 IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2015 - Proceedings},
pages = {170–177},
publisher = {Institute of Electrical and Electronics Engineers Inc.},
abstract = {High false alarm rates and execution times are among the key issues in host-based anomaly detection systems. In this paper, we investigate the use of trace abstraction techniques for reducing the execution time of anomaly detectors while keeping the same accuracy. The key idea is to represent system call traces as traces of kernel module interactions and use the resulting abstract traces as input to known anomaly detection techniques, such as STIDE (the Sequence Time-Delay Embedding) and HMM (Hidden Markov Models). We performed experiments on three datasets, namely, the traditional UNM dataset as well as two modern datasets, Firefox and ADFA-LD. The results show that kernel module traces can lead to similar or fewer false alarms and considerably smaller execution times compared to raw system call traces for host-based anomaly detection systems. © 2015 IEEE.},
note = {Journal Abbreviation: IEEE Symp. Comput. Intell. Secur. Def. Appl., CISDA - Proc.},
keywords = {Abstracting, Abstraction techniques, Alarm systems, Anomaly detection, Anomaly detection systems, Anomaly detector, Artificial intelligence, Chemical detection, Computer programming languages, Distributed computer systems, Errors, Hidden Markov models, Host-based Anomaly Detection System, Markov processes, Signal detection, Software dependability, Software security, System call traces, Time delay, Time delay embedding, Trace analysis, Trace Analysis and Abstraction},
pubstate = {published},
tppubtype = {inproceedings}
}