Type:
Conference Paper›Invited and refereed articles in conference proceedings
Authored by:
Baras, John S., Rabi, Maben.
Conference date:
September 30 - October 2, 2002
Conference:
5th International Conference, ISC 2002, Springer lecture notes in Computer Science (LNCS), Vol.2433, pp 32-47
Full Text Paper:
Abstract:
This paper address the task of detecting intrusions in the form of malicious attach on programs running OD a host computer system by inspecting the trace of system calls made by these programs. We use 'attack-tree' type generative models for such intrusions to select features that are used by a Support Vector Machine Classifier. Our approach combines the ability of an HMM generative model to handle variable-length strings, i.e. the traces, and the non-asymptotic nature of Support Vector Machines that permits them to work well with small training sets.