BlueBoX: A policy-driven, host-based intrusion detection system

  title={BlueBoX: A policy-driven, host-based intrusion detection system},
  author={Suresh Chari and Pau-Chen Cheng},
  journal={ACM Trans. Inf. Syst. Secur.},
Detecting attacks against systems has, in practice, largely been delegated to sensors, such as network intrustion detection systems. However, due to the inherent limitations of these systems and the increasing use of encryption in communication, intrusion detection and prevention have once again moved back to the host systems themselves. In this paper, we describe our experiences with building BlueBox, a host-based intrusion detection system. Our approach, based on the technique of system call… CONTINUE READING
Highly Cited
This paper has 139 citations. REVIEW CITATIONS


Publications citing this paper.
Showing 1-10 of 87 extracted citations

Secured networking by sandboxing LINUX 2.6

2009 IEEE International Conference on Systems, Man and Cybernetics • 2009
View 4 Excerpts
Highly Influenced

Visualizing and identifying intrusion context from system calls trace

20th Annual Computer Security Applications Conference • 2004
View 3 Excerpts
Highly Influenced

Securing the infrastructure and the workloads of linux containers

2015 IEEE Conference on Communications and Network Security (CNS) • 2015

140 Citations

Citations per Year
Semantic Scholar estimates that this publication has 140 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.

The Linux Intrusion Detection Project,

Huagang Xie, Philippe Biondi
View 5 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…