Host-based intrusion detection system with system calls: Review and future trends

M Liu, Z Xue, X Xu, C Zhong, J Chen - ACM computing surveys (CSUR), 2018 - dl.acm.org
In a contemporary data center, Linux applications often generate a large quantity of real-time
system call traces, which are not suitable for traditional host-based intrusion detection …

A survey on device behavior fingerprinting: Data sources, techniques, application scenarios, and datasets

PMS Sánchez, JMJ Valero, AH Celdrán… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
In the current network-based computing world, where the number of interconnected devices
grows exponentially, their diversity, malfunctions, and cybersecurity threats are increasing at …

Classification and analysis of malicious code detection techniques based on the APT attack

K Lee, J Lee, K Yim - Applied Sciences, 2023 - mdpi.com
According to the Fire-eye's M-Trends Annual Threat Report 2022, there are many advanced
persistent threat (APT) attacks that are currently in use, and such continuous and specialized …

[HTML][HTML] NLP methods in host-based intrusion detection Systems: A systematic review and future directions

ZT Sworna, Z Mousavi, MA Babar - Journal of Network and Computer …, 2023 - Elsevier
Abstract Host-based Intrusion Detection System (HIDS) is an effective last line of defense for
defending against cyber security attacks after perimeter defenses (eg, Network-based …

[HTML][HTML] Green intrusion detection systems: A comprehensive review and directions

S Roy, S Sankaran, M Zeng - Sensors, 2024 - mdpi.com
Intrusion detection systems have proliferated with varying capabilities for data generation
and learning towards detecting abnormal behavior. The goal of green intrusion detection …

A review of the advances in cyber security benchmark datasets for evaluating data-driven based intrusion detection systems

AI Abubakar, H Chiroma, SA Muaz, LB Ila - Procedia Computer Science, 2015 - Elsevier
Cybercrime has led to the loss of billions of dollars, the malfunctioning of computer systems,
the destruction of critical information, the compromising of network integrity and …

Machine learning (in) security: A stream of problems

F Ceschin, M Botacin, A Bifet, B Pfahringer… - … Threats: Research and …, 2024 - dl.acm.org
Machine Learning (ML) has been widely applied to cybersecurity and is considered state-of-
the-art for solving many of the open issues in that field. However, it is very difficult to evaluate …

Mining trends and patterns of software vulnerabilities

SS Murtaza, W Khreich, A Hamou-Lhadj… - Journal of Systems and …, 2016 - Elsevier
Zero-day vulnerabilities continue to be a threat as they are unknown to vendors; when
attacks occur, vendors have zero days to provide remedies. New techniques for the …

Intrusion detection system for applications using linux containers

AS Abed, C Clancy, DS Levy - … , STM 2015, Vienna, Austria, September 21 …, 2015 - Springer
Linux containers are gaining increasing traction in both individual and industrial use, and as
these containers get integrated into mission-critical systems, real-time detection of malicious …

Applying bag of system calls for anomalous behavior detection of applications in linux containers

AS Abed, TC Clancy, DS Levy - 2015 IEEE globecom …, 2015 - ieeexplore.ieee.org
In this paper, we present the results of using bags of system calls for learning the behavior of
Linux containers for use in anomaly-detection based intrusion detection system. By using …