loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Toshihiro Tabata and Kouichi Sakurai

Affiliation: Kyushu University, Japan

Keyword(s): Dynamic Linker, Intrusion detection system, Library function call, ELF.

Related Ontology Subjects/Areas/Topics: Information and Systems Security ; Intrusion Detection & Prevention ; Operating Systems Security

Abstract: As computers have become widely used, software vulnerability is now one of the most serious security threats. In particular, viruses and worms that use buffer overflow vulnerabilities are serious threats to computers. Therefore, techniques to detect the execution of malicious code are required when taking measures to prevent intrusion using such software vulnerabilities. An intrusion detection system is an example of such a defence mechanism against such attacks. The improvement in both false positive and false negative ratios, together with reduction of overhead are the problems to be overcome in an intrusion detection system. This paper presents the design of a user level intrusion detection system. This system can monitor the execution of target programs at both user and kernel levels. The access control function is divided between user and kernel. Access rights may also be checked with appropriate timing and with low overhead.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.191.202.45

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Tabata, T. and Sakurai, K. (2004). DESIGN OF INTRUSION DETECTION SYSTEM AT USER LEVEL WITH SYSTEM-CALL INTERPOSING. In Proceedings of the First International Conference on E-Business and Telecommunication Networks - Volume 2: ICETE; ISBN 972-8865-15-5; ISSN 2184-3236, SciTePress, pages 263-268. DOI: 10.5220/0001397602630268

@conference{icete04,
author={Toshihiro Tabata. and Kouichi Sakurai.},
title={DESIGN OF INTRUSION DETECTION SYSTEM AT USER LEVEL WITH SYSTEM-CALL INTERPOSING},
booktitle={Proceedings of the First International Conference on E-Business and Telecommunication Networks - Volume 2: ICETE},
year={2004},
pages={263-268},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001397602630268},
isbn={972-8865-15-5},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the First International Conference on E-Business and Telecommunication Networks - Volume 2: ICETE
TI - DESIGN OF INTRUSION DETECTION SYSTEM AT USER LEVEL WITH SYSTEM-CALL INTERPOSING
SN - 972-8865-15-5
IS - 2184-3236
AU - Tabata, T.
AU - Sakurai, K.
PY - 2004
SP - 263
EP - 268
DO - 10.5220/0001397602630268
PB - SciTePress