Construction of finite automata for intrusion detection from system call sequences by genetic algorithms

5Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Intrusion detection systems protect normal users and system resources from information security threats. Anomaly detection is an approach of intrusion detection that constructs models of normal behavior of users or systems and detects the behaviors that deviate from the model. Monitoring the sequences of system calls generated during the execution of privileged programs has been known to be an effective means of anomaly detection. Finite automata have been recognized as an appropriate device to model normal behaviors of system call sequences. However, there have been several technical difficulties in constructing finite automata from sequences of system calls. We present our study on how to construct finite automata from system call sequences using genetic algorithms. The resulting system is shown to be very effective in detecting intrusions through various experiments. © Springer-Verlag Berlin Heidelberg 2006.

Cite

CITATION STYLE

APA

Wee, K., & Kim, S. (2006). Construction of finite automata for intrusion detection from system call sequences by genetic algorithms. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3918 LNAI, pp. 594–602). https://doi.org/10.1007/11731139_69

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free