Anomaly Detection Using New Tracing Tricks on Program Executions and Analysis of System Data

被引:0
|
作者
Jidiga, Goverdhan Reddy [1 ]
Sammulal, P. [2 ]
机构
[1] Govt Telangana, Dept Tech Educ, Hyderabad, Andhra Pradesh, India
[2] JNTU Univ, JNTUH Coll Engn, Hyderabad, Andhra Pradesh, India
关键词
Anomaly detection; Function call; System call; Tracing tricks;
D O I
10.1007/978-981-10-2471-9_38
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Now the security of information and applications is getting abnormal attention in the public. Because the millions of expenditure spending to combat on continuous threats. The threats (anomalies) are widely occurred at programming scope by exploitation of coding and other side is at application scope due to bad structure of development. Today various machine learning techniques are applied over application level behavior to discriminate the anomalies, but not much work is done in coding exploits. So in this paper, we have given some rich extension work to detect wide range of anomalies at coding exploits. Here, we used some standard tracing tricks and tools available in Linux platform, which describe how to observe the behavior of program execution's outcomes and model the necessary information collected from system as part of active learning. The experimental work done on various codes of artificial programs, Linux commands and also compared their performance on artificial datasets collected while program normal runs.
引用
收藏
页码:389 / 399
页数:11
相关论文
共 50 条
  • [41] Anomaly detection using neuro fuzzy system
    Control and Intelligent Processing, Faculty of Electrical and Computer Engineering, University of Tehran, Tehran, Iran
    不详
    World Acad. Sci. Eng. Technol., 2009, (889-896):
  • [42] Incremental Anomaly-based Intrusion Detection System Using Limited Labeled Data
    Alaei, Parisa
    Noorbehbahani, Fakhroddin
    2017 3RD INTERNATIONAL CONFERENCE ON WEB RESEARCH (ICWR), 2017, : 178 - 184
  • [43] Anomaly Detection in Cyber-Physical System using Logistic Regression Analysis
    Noureen, Subrina Sultana
    Bayne, Stephen B.
    Shaffer, Edward
    Porschet, Donald
    Berman, Morris
    2019 IEEE TEXAS POWER AND ENERGY CONFERENCE (TPEC), 2019,
  • [44] Anomaly Detection on Intrusion Detection System Using CLIQUE Partitioning
    Nastaiinullah, N.
    Adiwijaya
    Kurniati, A. P.
    2014 2ND INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 2014,
  • [45] Querying Streaming System Monitoring Data for Enterprise System Anomaly Detection
    Gao, Peng
    Xiao, Xusheng
    Li, Ding
    Jee, Kangkook
    Chen, Haifeng
    Kulkarni, Sanjeev R.
    Mittal, Prateek
    2020 IEEE 36TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2020), 2020, : 1774 - 1777
  • [46] Anomaly Detection in Streaming Data using Isolation Forest
    Kareem, Mohammed Shaker
    Muhammed, Lamia AbedNoor
    PROCEEDINGS 2024 SEVENTH INTERNATIONAL WOMEN IN DATA SCIENCE CONFERENCE AT PRINCE SULTAN UNIVERSITY, WIDS-PSU 2024, 2024, : 223 - 228
  • [47] Data Discovery and Anomaly Detection Using Atypicality: Theory
    Host-Madsen, Anders
    Sabeti, Elyas
    Walton, Chad
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2019, 65 (09) : 5302 - 5322
  • [48] Survey on Anomaly Detection using Data Mining Techniques
    Agrawal, Shikha
    Agrawal, Jitendra
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS 19TH ANNUAL CONFERENCE, KES-2015, 2015, 60 : 708 - 713
  • [49] Anomaly Detection in Data Streams using Fuzzy Logic
    Khan, Muhammad Umair
    2009 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, 2009, : 126 - 133
  • [50] Anomaly Detection using Data Clustering and Neural Networks
    Qiu, Hai
    Eklund, Neil
    Hu, Xiao
    Yan, Weizhong
    Iyer, Naresh
    2008 IEEE INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, VOLS 1-8, 2008, : 3627 - 3633