z-logo
open-access-imgOpen Access
Intrusion Detection through Contiguous System Call Traces
Author(s) -
Lin Chen
Publication year - 2020
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1570/1/012020
Subject(s) - system call , intrusion detection system , computer science , window (computing) , operating system , computer security , trace (psycholinguistics) , server , big data , philosophy , linguistics
The server backend operating system for the Servers and scientific computing necessities is a big market, and the majority market share of this market is hold by the Linux based Operating System for a very long time period. However, as running in backend lack of humanity monitoring, and the default signature-based security measures are ineffectual for detecting stealth attacks, the Linux OS needs an intelligent intrusion detection solution. This paper proposed an automatous method to inspect the contiguous system call traces and identify the abnormal system call pattern only by analyzing a trace of small window size, rather than probing the full traces.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here