Review of A Semantic Approach to Host-based Intrusion Detection Systems Using Contiguous and Dis-contiguous System Call Patterns

Use of security tools are increased over recent years as a result of increased number of malicious events. To detect possible anomalous events security administrator makes use of intrusion detection system. Earlier intrusion detection systems have higher FPR and lower detection rate. This motivates many researchers for designing different models for detection. Designing host based intrusion detection is difficult task as there is various number of operating environment and difficulty in selecting features to be monitored for intrusion detection.

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered Tuesdays and Thursdays

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered Tuesdays and Thursdays

Resource Details

Provided by:
SSRG International Journals
Topic:
Security
Format:
PDF