- Home
- Publications
- Publication Search
- Publication Details
Title
Host-Based Intrusion Detection System with System Calls
Authors
Keywords
-
Journal
ACM COMPUTING SURVEYS
Volume 51, Issue 5, Pages 1-36
Publisher
Association for Computing Machinery (ACM)
Online
2018-11-20
DOI
10.1145/3214304
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Combining heterogeneous anomaly detectors for improved software security
- (2018) Wael Khreich et al. JOURNAL OF SYSTEMS AND SOFTWARE
- AnRAD: A Neuromorphic Anomaly Detection Framework for Massive Concurrent Data Streams
- (2018) Qiuwen Chen et al. IEEE Transactions on Neural Networks and Learning Systems
- A Scalable Data Chunk Similarity Based Compression Approach for Efficient Big Sensing Data Processing on Cloud
- (2017) Chi Yang et al. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
- Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling
- (2017) W. Haider et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Resource provisioning and work flow scheduling in clouds using augmented Shuffled Frog Leaping Algorithm
- (2017) Parmeet Kaur et al. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING
- Big-Sensing-Data Curation for the Cloud is Coming: A Promise of Scalable Cloud-Data-Center Mitigation for Next-Generation IoT and Wireless Sensor Networks
- (2017) Chi Yang et al. IEEE Consumer Electronics Magazine
- Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm
- (2016) Mohammed A. Ambusaidi et al. IEEE TRANSACTIONS ON COMPUTERS
- Malware Detection in Cloud Computing Infrastructures
- (2016) Michael R. Watson et al. IEEE Transactions on Dependable and Secure Computing
- Semantics-Based Online Malware Detection: Towards Efficient Real-Time Protection Against Malware
- (2016) Sanjeev Das et al. IEEE Transactions on Information Forensics and Security
- A three-way decision making approach to malware analysis using probabilistic rough sets
- (2016) Mohammad Nauman et al. INFORMATION SCIENCES
- A survey of network anomaly detection techniques
- (2016) Mohiuddin Ahmed et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Online anomaly detection for multi-source VMware using a distributed streaming framework
- (2016) Mohiuddin Solaimani et al. SOFTWARE-PRACTICE & EXPERIENCE
- A review on feature selection in mobile malware detection
- (2015) Ali Feizollah et al. Digital Investigation
- Proximity-Aware Local-Recoding Anonymization with MapReduce for Scalable Big Data Privacy Preservation in Cloud
- (2015) Xuyun Zhang et al. IEEE TRANSACTIONS ON COMPUTERS
- Detection of Denial-of-Service Attacks Based on Computer Vision Techniques
- (2015) Zhiyuan Tan et al. IEEE TRANSACTIONS ON COMPUTERS
- A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud
- (2015) Chi Yang et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- Deep learning
- (2015) Yann LeCun et al. NATURE
- Enhancing Big Data Security with Collaborative Intrusion Detection
- (2015) Zhiyuan Tan et al. IEEE Cloud Computing
- Back to Static Analysis for Kernel-Level Rootkit Detection
- (2014) Seyyedeh Atefeh Musavi et al. IEEE Transactions on Information Forensics and Security
- A hybrid approach for scalable sub-tree anonymization over big data using MapReduce on cloud
- (2014) Xuyun Zhang et al. JOURNAL OF COMPUTER AND SYSTEM SCIENCES
- A spatiotemporal compression based approach for efficient big data processing on Cloud
- (2014) Chi Yang et al. JOURNAL OF COMPUTER AND SYSTEM SCIENCES
- An Immediate System Call Sequence Based Approach for Detecting Malicious Program Executions in Cloud Environment
- (2014) Sanchika Gupta et al. WIRELESS PERSONAL COMMUNICATIONS
- A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns
- (2013) Gideon Creech et al. IEEE TRANSACTIONS ON COMPUTERS
- A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
- (2013) Zhiyuan Tan et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud
- (2013) Xuyun Zhang et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- Efficient and effective realtime prediction of drive-by download attacks
- (2013) Gaya K. Jayasinghe et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Alert correlation in collaborative intelligent intrusion detection systems—A survey
- (2011) Huwaida Tagelsir Elshoush et al. APPLIED SOFT COMPUTING
- A novel intrusion severity analysis approach for Clouds
- (2011) Junaid Arshad et al. Future Generation Computer Systems-The International Journal of eScience
- Anomaly Detection for Discrete Sequences: A Survey
- (2010) V. Chandola et al. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
- Anomaly detection
- (2009) Varun Chandola et al. ACM COMPUTING SURVEYS
- A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection
- (2009) Jiankun Hu et al. IEEE NETWORK
- A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference
- (2009) Xuan Dau Hoang et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Detecting Intrusions through System Call Sequence and Argument Analysis
- (2008) Federico Maggi et al. IEEE Transactions on Dependable and Secure Computing
Publish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn MoreCreate your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create Now