Applying Bag of System Calls for Anomalous Behavior Detection of Applications in Linux Containers.
Amr S. AbedT. Charles ClancyDavid S. LevyPublished in: CoRR (2016)
Keyphrases
- anomalous behavior
- anomaly detection
- operating system
- automatic detection
- detection algorithm
- intrusion detection
- detection method
- false positives
- open source
- object detection
- detection rate
- normal behavior
- feature extraction
- file system
- unsupervised learning
- databases
- intrusion detection system
- user friendly
- image segmentation
- false alarms
- information systems