Intrusion detection using sequences of system calls

  • Authors:
  • Steven A. Hofmeyr;Stephanie Forrest;Anil Somayaji

  • Affiliations:
  • (Correspd.) Department of Computer Science, University of New Mexico, Albuquerque, NM 87131-1386, USA E-mail: {steveah,forrest,soma}@cs.unm.edu;Department of Computer Science, University of New Mexico, Albuquerque, NM 87131-1386, USA E-mail: {steveah,forrest,soma}@cs.unm.edu;Department of Computer Science, University of New Mexico, Albuquerque, NM 87131-1386, USA E-mail: {steveah,forrest,soma}@cs.unm.edu

  • Venue:
  • Journal of Computer Security
  • Year:
  • 1998

Quantified Score

Hi-index 0.02

Visualization

Abstract

A method is introduced for detecting intrusions at the level of privileged processes. Evidence is given that short sequences of system calls executed by running processes are a good discriminator between normal and abnormal operating characteristics of several common UNIX programs. Normal behavior is collected in two ways: Synthetically, by exercising as many normal modes of usage of a program as possible, and in a live user environment by tracing the actual execution of the program. In the former case several types of intrusive behavior were studied; in the latter case, results were analyzed for false positives.