Using static analysis for Ajax intrusion detection

A Guha, S Krishnamurthi, T Jim - … of the 18th international conference on …, 2009 - dl.acm.org
We present a static control-flow analysis for JavaScript programs running in a web browser.
Our analysis tackles numerous challenges posed by modern web applications including …

The evolution of system-call monitoring

S Forrest, S Hofmeyr, A Somayaji - 2008 annual computer …, 2008 - ieeexplore.ieee.org
Computer security systems protect computers and networks from unauthorized use by
external agents and insiders. The similarities between computer security and the problem of …

{FRAPpuccino}: Fault-detection through Runtime Analysis of Provenance

X Han, T Pasquier, T Ranjan, M Goldstein… - 9th USENIX Workshop …, 2017 - usenix.org
We present FRAPpuccino (or FRAP), a provenance-based fault detection mechanism for
Platform as a Service (PaaS) users, who run many instances of an application on a large …

Surveillance of anomaly and misuse in critical networks to counter insider threats using computational intelligence

DS Punithavathani, K Sujatha, JM Jain - Cluster Computing, 2015 - Springer
The Insider threat is minimally addressed by current information security practices, yet the
insider poses the most serious threat to organization through various malicious activities …

A host intrusion detection system architecture for embedded industrial devices

CV Martinez, B Vogel-Heuser - journal of the Franklin Institute, 2021 - Elsevier
Abstract The integration of Cyber-Physical Systems in the industrial domain has become
indispensable for Industry 4.0. Unfortunately, as the interconnectivity among them increases …

A formal framework for program anomaly detection

X Shu, D Yao, BG Ryder - Research in Attacks, Intrusions, and Defenses …, 2015 - Springer
Program anomaly detection analyzes normal program behaviors and discovers aberrant
executions caused by attacks, misconfigurations, program bugs, and unusual usage …

Network topology effects on the detectability of crossfire attacks

C Liaskos, S Ioannidis - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
New strains of distributed denial-of-service (DDoS) attacks have exhibited potential to
disconnect communication networks, even cutting off entire countries from the Internet. The …

Time and sequence integrated runtime anomaly detection for embedded systems

S Lu, R Lysecky - ACM Transactions on Embedded Computing Systems …, 2017 - dl.acm.org
Network-connected embedded systems grow on a large scale as a critical part of Internet of
Things, and these systems are under the risk of increasing malware. Anomaly-based …

Long-span program behavior modeling and attack detection

X Shu, D Yao, N Ramakrishnan, T Jaeger - ACM Transactions on Privacy …, 2017 - dl.acm.org
Intertwined developments between program attacks and defenses witness the evolution of
program anomaly detection methods. Emerging categories of program attacks, eg, non …

Selecting and improving system call models for anomaly detection

A Frossi, F Maggi, GL Rizzo, S Zanero - … , DIMVA 2009, Como, Italy, July 9 …, 2009 - Springer
We propose a syscall-based anomaly detection system that incorporates both deterministic
and stochastic models. We analyze in detail two alternative approaches for anomaly …