Filters








35,940 Hits in 7.6 sec

Detecting Illegal System Calls Using a Data-Oriented Detection Model [chapter]

Jonathan-Christofer Demay, Frédéric Majorczyk, Eric Totel, Frédéric Tronel
2011 IFIP Advances in Information and Communication Technology  
A popular method to detect such anomaly is the use of application sequences of system calls.  ...  This approach consists in building automatically a data-oriented behaviour model of an application by static analysis of its source code.  ...  Our mechanism relies on a data-oriented behavior model to detect erroneous states that could lead to illegal system calls.  ... 
doi:10.1007/978-3-642-21424-0_25 fatcat:fe3jaczhmzfe7e5bkfh2tktziq

SIDAN: A tool dedicated to software instrumentation for detecting attacks on non-control-data

Jonathan-Christofer Demay, Eric Totel, Frederic Tronel
2009 2009 Fourth International Conference on Risks and Security of Internet and Systems (CRiSIS 2009)  
Our approach aims at exploiting the internal state of a program to detect a memory corruption on non-control-data that could lead to an illegal system call.  ...  This anomaly approach, unlike the misuse approach, is able to detect unknown attacks. A basic technique to build such a model for a program is to use the system call sequences of the process.  ...  In this paper, we propose an approach for intrusion detection that focuses on non-control-data attacks by building a model to detect memory inconsistencies that may lead to an illegal system call.  ... 
doi:10.1109/crisis.2009.5411977 dblp:conf/crisis/DemayTT09 fatcat:u7quyodmwfgxnd5xjyq5fhk564

Anti-Money Laundering Recognition through the Gradient Boosting Classifier

Naresh Babu Bynagari, Alim Al Ayub Ahmed
2021 Zenodo  
The accuracy, sensitivity, recollect, F1-score, non-linear data, and other metrics were used to assess the described classifiers.  ...  Perhaps the most disturbing danger to the solidness and progress of the economy of the world is the beast called illegal tax avoidance.  ...  Use selected data sampling techniques to improve the detection of both genuine and fraudulent activities at a transactional level using a gradient boosting algorithm.  ... 
doi:10.5281/zenodo.5523918 fatcat:sub742twinbrdjxiurenm45r3q

On a pattern-oriented model for intrusion detection

Shiuh-Pyng Shieh, V.D. Gligor
1997 IEEE Transactions on Knowledge and Data Engineering  
We motivate the need for pattern-oriented intrusion detection, and present a model that tracks both data and privilege flows within secure systems to detect context-dependent intrusions caused by operational  ...  As with all pattern-oriented models, this model cannot be used to detect new, unanticipated intrusion patterns that could be detected by statistical models.  ...  AN APPLICATION OF THE INTRUSION-DETECTION MODEL In this section, we illustrate the detection of unintended use of a foreign program by using our model.  ... 
doi:10.1109/69.617059 fatcat:zf24phj7lbhghbvbz75ycs7m5e

DYNAMIC MONITORING METHOD OF ILLEGAL BUILDINGS USING SPATIOTEMPORAL BIG DATA BASED ON URBAN HIGH LYING ZONES

B. S. Li, Z. C. Tan
2020 The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences  
There is a possibility to solve these problems using the ubiquitous network of base stations in cities to monitor illegal buildings.This paper proposes a dynamic monitoring method of illegal buildings  ...  using spatiotemporal big data based on urban high lying zones.  ...  buildings: use geographic information software to obtain the height or area of illegal buildings from the digital surface model, add the DSM file in Arcgis, and then create a new point layer, using the  ... 
doi:10.5194/isprs-archives-xlii-3-w10-17-2020 fatcat:iobxcy6udvgnjivitse7x52avy

Program Anomaly Detection

Xiaokui Shu, Danfeng Yao
2016 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16  
We will give a general definition for program anomaly detection and derive model abstractions from the definition.  ...  Some lab tools will be provided to help understand primitive detection models.  ...  Conventional systems were designed to detect illegal control flows or anomalous system calls based on two primitive paradigms: i) n-gram short call sequence validation that was introduced by Forrest et  ... 
doi:10.1145/2976749.2976750 dblp:conf/ccs/ShuY16 fatcat:yaihukb5s5dzjlj6rjrwxspdd4

THE IDENTIFICATION OF PILL USING FEATURE EXTRACTION IN IMAGE MINING

Hema A, Anna Saro E
2015 ICTACT Journal on Image and Video Processing  
Image mining is the method in which the unusual patterns are detected so that both hidden and useful data images can only be stored in large database.  ...  This research presents a drug identification, registration, detection and matching, Text, color and shape extraction of the image with image mining concept to identify the legal and illegal pills with  ...  Image mining is the idea used to detect unusual patterns and extract implicit and useful data from images stored in the large data bases.  ... 
doi:10.21917/ijivp.2015.0143 fatcat:6cyhyptxlzgdfeifouc4qvwy5m

An overview of Intrusion Detection within an Information System: The Improvment by Process Mining

Nkondock Mi Bahanag Nicolas, Atsa Etoundi Roger
2022 Network and Communication Technologies  
The purpose of this paper is to present an overview of existing intrusion detection techniques compared to a new issue based on process mining used for event logs analysis to detect abnormal events that  ...  Information Systems handle big amount of data within enterprises by offering the possibility to collect, treat, keep and make information avail- able.  ...  This review presents Process Mining as a solution to tackle Host Intrusion Detection challenges, because it improves classic Machine Learning and Data mining technics used before by building the model  ... 
doi:10.5539/nct.v7n1p55 fatcat:27hzjlrxcbfz5fdiutpn2luyae

Using Unmanned Aerial Vehicle Remote Sensing and a Monitoring Information System to Enhance the Management of Unauthorized Structures

Yuanrong He, Weiwei Ma, Zelong Ma, Wenjie Fu, Chihcheng Chen, Cheng-Fu Yang, Zhen Liu
2019 Applied Sciences  
First, UAV dynamic aerial photography was used to obtain dynamic digital surface model (DSM) data and elevation changes of 2–8 m as the initial sieve target.  ...  At the same time, mobile geographic information system (GIS) software was used to survey the field, and the information gathered was developed to support unauthorized construction detection.  ...  Then, unauthorized construction was verified using a 3D model and 720 • panorama imaging to obtain accurate data on illegal buildings.  ... 
doi:10.3390/app9224954 fatcat:zrlwrzupm5bqpemvkfnxz6ddau

Analysis of Machine Learning Algorithms to Protect from Phishing in Web Data Mining

N. Swapna
2017 International Journal of Computer Applications  
We designed prototype of website phishing detection solution to address the requirements for both effective and efficient phishing detection machine learning big data allows us to dig into a tremendous  ...  The term Big data is a large data sets those outgrow the simple kind of database and data handling design.  ...  Database oriented methods do not search for a best model as the previous methods specific heuristics are used to exploit the characteristics of the data, attribute oriented induction iterative database  ... 
doi:10.5120/ijca2017912743 fatcat:nt4vh7gdazdqxa4r7u5ddqafa4

An Android Security Extension to Protect Personal Information against Illegal Accesses and Privilege Escalation Attacks

Yeongung Park, Chanhee Lee, Jonghwa Kim, Seong-je Cho, Jongmoo Choi
2012 Journal of Internet Services and Information Security  
Our proposed scheme can detect and respond to malware that illegally acquires rootlevel privilege using pWhitelist, a list of trusted programs with root-level permission.  ...  As a result, it protects personal information against illegal accesses by malicious applications even though they illegally obtain root-level permissions by exploiting vulnerabilities of trusted programs  ...  In this paper, we propose a new kernel-level security model to efficiently prevent privilege escalation attacks and protect users' private data against illegally privileged programs in an Android environment  ... 
doi:10.22667/jisis.2012.11.31.029 dblp:journals/jisis/ParkLKCC12 fatcat:7ssx3cdnpbcwjb2wdnz73ledlu

Effective Electricity Theft Detection in Power Distribution Grids Using an Adaptive Neuro Fuzzy Inference System

Konstantinos V. Blazakis, Theodoros N. Kapetanakis, George S. Stavrakakis
2020 Energies  
Detection of illegal electricity power consumption is a crucial issue for distribution system operators (DSOs).  ...  data to solve the problem of power theft more efficiently.  ...  Hybrid methods use data from both categories. Various data oriented, network oriented and hybrid methods can be found in the literature [1] [2] [3] .  ... 
doi:10.3390/en13123110 fatcat:ke6e5ab42jftfbhxw5ie2rzkgm

Signature based Network Intrusion Detection System using Feature Selection on Android

Onyedeke Obinna Cyril, Taoufik Elmissaoui, Okoronkwo M.C, Ihedioha Uchechi, Chikodili H.Ugwuishiwu, Okwume .B.
2020 International Journal of Advanced Computer Science and Applications  
This approach was used to model and develop the system using real intrusion features and processes to detect intrusions more flexibly and efficiently.  ...  The proposed system (SIDS) detects any intrusion or illegal activities on android and also takes a selfie of the intruder unknown to him/her and keep in the log for the view of the user.  ...  The Object Oriented Analysis and Design Methodology (OOADM) were used for the analysis, design and development of the system and Unified Modeling Language (UML) to model the system.  ... 
doi:10.14569/ijacsa.2020.0110667 fatcat:e4r3ujndsrcztjge5p7bfklpum

Event Detection in Multilevel Secure Active Databases [chapter]

Indrakshi Ray, Wei Huang
2005 Lecture Notes in Computer Science  
Using such techniques cause illegal information flow. Our goal is to propose new algorithms that prevent such illegal information flow.  ...  Since an MLS rule can be triggered by an event that is at a different security level than the rule, we cannot use the event detection techniques designed for non-MLS active databases.  ...  Event detection involves detecting primitive as well as composite events. Traditionally system clock and interrupts are used to detect primitive events.  ... 
doi:10.1007/11593980_13 fatcat:knuuzexjdjf6bnfloy2ivodfoq

Contribution to Securing Connections in a Communications Network: Modeling and Conception of a Fraud Detector

Souad EZZBADY, Abdelwahed NAMIR
2016 International Journal of Advanced Research in Artificial Intelligence (IJARAI)  
It is in this sense that this work is located, whose objective is firstly to model the data as a graph with nodes representing users and arcs represent the connection between users.  ...  Indeed, it is to propose a modeling and conception of a technique to improve the communication network management to monitor and report real-time alerts in the event of fraud.  ...  It opens the way to various research perspectives:  Extend this work and write to the graph-oriented databases.  Connect this application to large databases that is to say the Big DataUse Orient DB  ... 
doi:10.14569/ijarai.2016.051104 fatcat:hypq7rqyjzbmxp6zfdix5j3u6i
« Previous Showing results 1 — 15 out of 35,940 results