Applying Bag of System Calls for Anomalous Behavior Detection of Applications in Linux Containers.
Amr S. AbedT. Charles ClancyDavid S. LevyPublished in: GLOBECOM Workshops (2015)
Keyphrases
- anomalous behavior
- anomaly detection
- normal behavior
- detection rate
- operating system
- detection algorithm
- intrusion detection
- false positives
- database applications
- false alarms
- automatic detection
- intrusion detection system
- object detection
- bag of words
- action recognition
- information systems
- itemsets
- supervised learning
- metadata