Results 1 - 10
of
1,139
A Sense of Self for Unix Processes
- In Proceedings of the 1996 IEEE Symposium on Security and Privacy
, 1996
"... A method for anomaly detection is introduced in which "normal" is defined by short-range correlations in a process ' system calls. Initial experiments suggest that the definition is stable during normal behavior for standard UNIX programs. Further, it is able to detect several common ..."
Abstract
-
Cited by 689 (27 self)
- Add to MetaCart
A method for anomaly detection is introduced in which "normal" is defined by short-range correlations in a process ' system calls. Initial experiments suggest that the definition is stable during normal behavior for standard UNIX programs. Further, it is able to detect several common
Simulink Unix process
"... Using the model-based engineering paradigm for the design of a system, the system is decomposed into several compo-nents and models are developed for these components. The models are preferably specied using domain-specic mod-elling formalisms. By means of co-simulation, the component models can be ..."
Abstract
- Add to MetaCart
-function interface as present in Matlab Simulink, to sim-ulate models that consist of subsystems modelled using Mat-lab Simulink and subsystems modelled in the hybrid process algebra Chi ( ). The principles of the implementation of the framework are described and the framework is illustrated by means of a bottle
The Unix Time-Sharing System
- Communications of the ACM
, 1974
"... Unix is a general-purpose, multi-user, interactive operating system for the larger Digital Equipment Corporation PDP-11 and the Interdata 8/32 computers. It offers a number of features seldom found even in larger operating systems, including i A hierarchical file system incorporating demountable vol ..."
Abstract
-
Cited by 539 (14 self)
- Add to MetaCart
Unix is a general-purpose, multi-user, interactive operating system for the larger Digital Equipment Corporation PDP-11 and the Interdata 8/32 computers. It offers a number of features seldom found even in larger operating systems, including i A hierarchical file system incorporating demountable
A Sense of Self for Unix Processes
- In Proceedings of the 1996 IEEE Symposium on Security and Privacy
, 1996
"... A method for anomaly detection is introduced in which "normal" is defined by short-range correlations in a process ' system calls. Initial experiments suggest that the definition is stable during normal behavior for standard UNIX programs. Further, it is able to detect several common ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
A method for anomaly detection is introduced in which "normal" is defined by short-range correlations in a process ' system calls. Initial experiments suggest that the definition is stable during normal behavior for standard UNIX programs. Further, it is able to detect several common
A Senseof Self for Unix Processes
"... A method for anomaly detection is introduced in which “normal ” is defined by short-range correlations in a process’ system calls. Initial experiments suggest that the definition is stable during normal behavior for standard UNIX programs. Furthec it is able to detect several common intrusions invol ..."
Abstract
- Add to MetaCart
A method for anomaly detection is introduced in which “normal ” is defined by short-range correlations in a process’ system calls. Initial experiments suggest that the definition is stable during normal behavior for standard UNIX programs. Furthec it is able to detect several common intrusions
Learning Patterns from Unix Process Execution Traces for Intrusion Detection
- In AAAI Workshop on AI Approaches to Fraud Detection and Risk Management
, 1997
"... In this paper we describe our preliminary experiments to extend the work pioneered by Forrest (see Forrest et al. 1996) on learning the (normal and abnormal) patterns of Unix processes. These patterns can be used to identify misuses of and intrusions in Unix systems. We formulated machine learning t ..."
Abstract
-
Cited by 132 (20 self)
- Add to MetaCart
In this paper we describe our preliminary experiments to extend the work pioneered by Forrest (see Forrest et al. 1996) on learning the (normal and abnormal) patterns of Unix processes. These patterns can be used to identify misuses of and intrusions in Unix systems. We formulated machine learning
The SAS ® Terminator: An Ultimate Killer of UNIX Processes
"... As a UNIX SAS user, you may not realize that when your SAS program terminates, whether voluntarily or by external force, it may leave behind one or more UNIX processes spawned by the now dead top level process. In fact, a SAS program can create multiple generations of processes. Merely killing the p ..."
Abstract
- Add to MetaCart
As a UNIX SAS user, you may not realize that when your SAS program terminates, whether voluntarily or by external force, it may leave behind one or more UNIX processes spawned by the now dead top level process. In fact, a SAS program can create multiple generations of processes. Merely killing
Towards a Dynamic Object Model within Unix Processes
"... Programmers face much complexity from the co-existence of “native ” (Unix-like) and virtual machine (VM) “man-aged ” run-time environments. Rather than having VMs re-place Unix processes, we investigate whether it makes sense for the latter to “become VMs”, by evolving Unix’s user-level services to ..."
Abstract
- Add to MetaCart
Programmers face much complexity from the co-existence of “native ” (Unix-like) and virtual machine (VM) “man-aged ” run-time environments. Rather than having VMs re-place Unix processes, we investigate whether it makes sense for the latter to “become VMs”, by evolving Unix’s user-level services
The BSD Packet Filter: A New Architecture for User-level Packet Capture
, 1992
"... Many versions of Unix provide facilities for user-level packet capture, making possible the use of general purpose workstations for network monitoring. Because network monitors run as user-level processes, packets must be copied across the kernel/user-space protection boundary. This copying can be m ..."
Abstract
-
Cited by 568 (2 self)
- Add to MetaCart
Many versions of Unix provide facilities for user-level packet capture, making possible the use of general purpose workstations for network monitoring. Because network monitors run as user-level processes, packets must be copied across the kernel/user-space protection boundary. This copying can
Exokernel: An Operating System Architecture for Application-Level Resource Management
, 1995
"... We describe an operating system architecture that securely multiplexes machine resources while permitting an unprecedented degree of application-specific customization of traditional operating system abstractions. By abstracting physical hardware resources, traditional operating systems have signifi ..."
Abstract
-
Cited by 732 (24 self)
- Add to MetaCart
Aegis operations are 10–100 times faster than Ultrix,a mature monolithic UNIX operating system. ExOS implements processes, virtual memory, and inter-process communication abstractions entirely within a library. Measurements show that ExOS’s application-level virtual memory and IPC primitives are 5
Results 1 - 10
of
1,139