[1] Symantec.2019 Internet security threat report[EB/OL].[2021-04-23].https://docs.broadcom.com/doc/internet-security-threat-report-volume-24-en
[2] 朱雪冰,周安民,左政.基于家族行为频繁子图挖掘的恶意代码检测[J].信息安全研究, 2019, 5(2):105-113
[3] Forrest S, Hofmeyr S A, Somayaji A, et al.A sense of self for unix processes [C] //Proc of 1996 IEEE Symp on Security and Privacy.Piscataway, NJ:IEEE, 1996:120-128
[4] 冯亚玲.基于系统调用的恶意软件检测技术研究[J].信息安全研究, 2016, 2(4)367-371
[5] Creech G, Hu J.A semantic approach to host-based intrusion detection systems using contiguousand discontiguous system call patterns [J].IEEE Trans on Computers, 2013, 63(4):807-819
[6] Liu M, Xue Z, Xu X, et al.Host-based intrusion detection system with system calls:Review and future trends [J].ACM Computing Surveys, 2018, 51(5):1-36
[7] Jose S, Malathi D, Reddy B, et al.A survey on anomaly based host intrusion detection system [C] //Journal of Physics Conf Series. Bristol:IOP Publishing, 2018
[8] Murtaza S S, Khreich W, Hamou-Lhadj A, et al.A trace abstraction approach for host-based anomaly detection [C] //Proc of 2015 IEEE Symp on Computational Intelligence for Security and Defense Applications.Piscataway, NJ:IEEE, 2015:1-8
[9] Creech G, Hu J.Generation of a new IDS test dataset:Time to retire the KDD collection [C] //Proc of 2013 IEEE Wireless Communications and Networking Conf.Piscataway, NJ:IEEE, 2013:4487-4492
[10] Ehsan A, Gursel S.Ensemble classifier for misuse detection using N-gram feature vectors through operating system call traces [J]. International Journal of Hybrid Intelligent Systems, 2017, 14(3):141-154
[11] Zhao Y, Bo B, Feng Y, et al.A feature extraction method of hybrid gram for malicious behavior based on machine learning [J].Security and Communication Networks, 2019, 2019(2):1-8
[12] Murtaza S S, Khreich W, Hamou-Lhadj A, et al A host-based anomaly detection approach by representing system calls as states of kernel modules [C] //Proc of the 24th IEEE Int Symp on Software Reliability Engineering.Piscataway, NJ:IEEE, 2013:431-440
[13] Mishra P,Varadharajan V, Pilli E S, et al.Vmguard:A vmi-based security architecture for intrusion detection in cloud environment [J].IEEE Trans on Cloud Computing, 2018, 8(3):957-971
[14] Haider W, Creech G, Xie Yi, et al.Windows based data sets for evaluation of robustness of host based intrusion detection systems (IDS) to zero-day and stealth attacks [J].Future Internet, 2016, 8(3):29
|