Review of A Semantic Approach to Host-based Intrusion Detection Systems Using Contiguous and Dis-contiguous System Call Patterns

Download Now
Provided by: SSRG International Journals
Topic: Security
Format: PDF
Use of security tools are increased over recent years as a result of increased number of malicious events. To detect possible anomalous events security administrator makes use of intrusion detection system. Earlier intrusion detection systems have higher FPR and lower detection rate. This motivates many researchers for designing different models for detection. Designing host based intrusion detection is difficult task as there is various number of operating environment and difficulty in selecting features to be monitored for intrusion detection.
Download Now

Find By Topic