String distances and intrusion detection: Bridging the gap between formal languages and computer security
Danilo Bruschi; Giovanni Pighizzini
RAIRO - Theoretical Informatics and Applications (2006)
- Volume: 40, Issue: 2, page 303-313
- ISSN: 0988-3754
Access Full Article
topAbstract
topHow to cite
topReferences
top- E. Allender, D. Bruschi and G. Pighizzini, The complexity of computing maximal word functions. Comput. Compl.3 (1993) 368–391.
- J.P. Anderson, Computer security threat monitoring and surveillance. Tech. Rep., James P. Anderson Company, Fort Washington (1980).
- F. Brandenburg, On one-way auxiliary pushdown automata, in Proc. 3rd GI Conference. Lect. Notes Comput. Sci.48 (1977) 133–144.
- C. Choffrut and G. Pighizzini, Distances between languages and reflexivity of relations. Theoret. Comput. Sci.286 (2002) 117–138.
- S. Cook, Characterization of pushdown machines in terms of time–bounded computers. J. ACM18 (1971) 4–18.
- S. Cook, A taxonomy of problems with fast parallel algorithms. Inform. Control64 (1985) 2–22.
- D.E. Denning, An intrusion detection model. IEEE Trans. Software Engineering13 (1987).
- H. Feng, O. Kolesnikov, P. Fogla, W. Lee and W. Gong, Anomaly detection using call stack information, in Proc. IEEE Symposium on Security and Privacy. IEEE Press (2003).
- S. Forrest, S. Hofmeyr, A. Somayaji and T. Longstaff, A sense of self for Unix processes, in Proc. IEEE Symposium on Security and Privacy. IEEE Press (1996).
- S. Forrest, S. Hofmeyr, A. Somayaji and T. Longstaff, Intrusion detection using sequences of system calls. J. Comput. Security6 (1998) 151–180.
- A.K. Ghosh and A. Schwartzbard, A study in using neural networks for anomaly and misuse detection, in Proc. USENIX Security Symposium. USENIX Association (1999).
- J. Hopcroft and J. Ullman, Introduction to automata theory, languages, and computations. Addison-Wesley, Reading, MA (1979).
- R. Karp and V. Ramachandran, A survey of parallel algorithms for shared-memory machines, in Handbook of Theoretical Computer Science, Vol. A. North Holland (1990).
- C. Marceau, Characterizing the behavior of a program using Multiple length N-grams, in Proc. New Security Paradimg Workshop. ACM Press (2000) 101–110.
- G. Pighizzini, How Hard is Computing the Edit Distance? Inform. Comput.165 (2001) 1–13.
- R. Sekar, M. Bendre, D. Dhurjati and P. Bollineni, A fast automaton-based method for detecting anomalous program behaviors, in Proc. IEEE Symposium on Security and Privacy. IEEE Press (2001).
- Y. Shiloach and U. Vishkin, Finding the maximum, merging and sorting in a parallel computation model. J. Algorithms2 (1981) 88–102.
- D. Wagner and D. Dean, Intrusion detection via static analisys, in Proc. IEEE Symposium on Security and Privacy (2001).
- H. Venkateswaran, Properties that characterize LOGCFL. J. Comput. Syst. Sci.43 (1991) 380–404.