Intrusion Detection Using Variable-length System Calls Patterns

WANG Fuhong,PENG Qinke,LI Naijie
DOI: https://doi.org/10.3969/j.issn.1000-3428.2006.20.052
2006-01-01
Abstract:A novel simple technique to build a table of variable-length patterns from training system call sequences is presented, aiming to find outa set of basic and relatively independent variable-length patterns. Also, the method finds out all possible relationship between variable-lengthpatterns, and thereby generates an exact DFA representation of the program. Using the data sets from the university of New Mexico, the schema isevaluated by several targets—sizes of variable-length patterns, false positives and false negatives. The experimental results indicate that thealgorithms generate a relative small set of patterns, and get very low false positives and false negatives.
What problem does this paper attempt to address?