• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

DMCA

Intrusion Detection via Static Analysis (2001)

Cached

  • Download as a PDF

Download Links

  • [www.cs.berkeley.edu]
  • [www-csag.ucsd.edu]
  • [www.eng.tau.ac.il]
  • [www.cs.berkeley.edu]
  • [http.cs.berkeley.edu]
  • [www.cs.iastate.edu]
  • [www.csl.sri.com]
  • [www.csl.sri.com]
  • [www2.parc.com]
  • [now.cs.berkeley.edu]
  • [www.cs.virginia.edu]
  • [www.eecs.berkeley.edu]
  • [www.gnucash.org]
  • [www.cs.berkeley.edu]
  • [http.cs.berkeley.edu]
  • [www.eecs.berkeley.edu]
  • [gnucash.org]
  • [web.cs.iastate.edu]
  • [www.cs.jhu.edu]
  • [www.scs.carleton.ca]
  • [www.cc.gatech.edu]
  • [wenke.gtisc.gatech.edu]
  • [people.scs.carleton.ca]
  • [people.scs.carleton.ca]
  • [people.scs.carleton.ca]
  • [people.scs.carleton.ca]

  • Other Repositories/Bibliography

  • DBLP
  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by David Wagner , Drew Dean
Citations:352 - 1 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

BibTeX

@MISC{Wagner01intrusiondetection,
    author = {David Wagner and Drew Dean},
    title = {Intrusion Detection via Static Analysis},
    year = {2001}
}

Share

Facebook Twitter Reddit Bibsonomy

OpenURL

 

Abstract

One of the primary challenges in intrusion detection is modelling typical application behavior, so that we can recognize attacks by their atypical effects without raising too many false alarms. We show how static analysis may be used to automatically derive a model of application behavior. The result is a host-based intrusion detection system with three advantages: a high degree of automation, protection against a broad class of attacks based on corrupted code, and the elimination of false alarms. We report on our experience with a prototype implementation of this technique. 1. Introduction Computer security has undergone a major renaissance in the last five years. Beginning with Sun's introduction of the Java language and its support of mobile code in 1995, programming languages have been a major focus of security research. Many papers have been published applying programming language theory to protection problems [25, 24], especially information flow [17]. Security, however, is a ma...

Keyphrases

intrusion detection    static analysis    typical application behavior    broad class    mobile code    atypical effect    host-based intrusion detection system    programming language theory    protection problem    java language    security research    false alarm    corrupted code    high degree    prototype implementation    application behavior    major focus    information flow    major renaissance    many paper    primary challenge    many false alarm    introduction computer security   

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University