Authors
Salvatore J Stolfo, Shlomo Hershkop, Linh H Bui, Ryan Ferster, Ke Wang
Publication date
2005
Conference
Foundations of Intelligent Systems: 15th International Symposium, ISMIS 2005, Saratoga Springs, NY, USA, May 25-28, 2005. Proceedings 15
Pages
14-28
Publisher
Springer Berlin Heidelberg
Description
We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file systems to detect abnormal accesses. The File Wrapper Anomaly Detector (FWRAP) has two parts, a sensor that audits file systems, and an unsupervised machine learning system that computes normal models of those accesses. FWRAP employs the Probabilistic Anomaly Detection (PAD) algorithm previously reported in our work on Windows Registry Anomaly Detection. FWRAP represents a general approach to anomaly detection. The detector is first trained by operating the host computer for some amount of time and a model specific to the target machine is automatically computed by PAD. The model is then deployed to a real-time detector. In this paper we describe the feature set used to model file system accesses, and the performance …
Total citations
20052006200720082009201020112012201320142015201620172018201920202021202220232024213115137613361126421
Scholar articles
SJ Stolfo, S Hershkop, LH Bui, R Ferster, K Wang - Foundations of Intelligent Systems: 15th International …, 2005