There are no reviews yet. Be the first to send feedback to the community and the maintainers!
Repository Details
Cyber-security is concerned with protecting information, a vital asset in today’s world. The volume of data that is generated and can be usefully analysed is such that cyber-security can only be effectively implemented with the aid of software support. Data must be analysed by software tools providing support for security analysts. Often event data generated by computer systems is sequential, that is, not only are the type of the events relevant, but the sequence in which events occur is also relevant. Examples of this include many log files and system call or software library call sequences. This research aims to provide the basis to build an Anomaly Detection based Host Intrusion Detection System (HIDS) that makes decisions based on sequential traces of operating system calls.