Detecting Intrusions using System Calls: Alternative Data Models

Abstract

Intrusion detection systems rely on a wide variety of observable data to distinguish between legitimate and illegitimate activities. In this paper we study one such observable— sequences of system calls into the kernel of an operating system. Using system-call data sets generated by several different programs, we compare the ability of different data modeling methods to represent normal behavior accurately and to recognize intrusions. We compare the following methods: Simple enumeration of observed sequences, comparison of relative frequencies of different sequences, a rule induction technique, and Hidden Markov Models (HMMs). We discuss the factors affecting the performance of each method, and conclude that for this particular problem, weaker methods than HMMs are likely sufficient.

DOI: 10.1109/SECPRI.1999.766910

Extracted Key Phrases

6 Figures and Tables

050100'00'02'04'06'08'10'12'14'16
Citations per Year

1,083 Citations

Semantic Scholar estimates that this publication has 1,083 citations based on the available data.

See our FAQ for additional information.

Cite this paper

@inproceedings{Warrender1999DetectingIU, title={Detecting Intrusions using System Calls: Alternative Data Models}, author={Christina Warrender and Stephanie Forrest and Barak A. Pearlmutter}, booktitle={IEEE Symposium on Security and Privacy}, year={1999} }