Check out the new USENIX Web site.
... program.1
Our original paper on using system calls for intrusion detection [16] used a technique called ``lookahead pairs.'' pH uses the original lookahead pairs algorithm as described here, except that it looks behind instead of ahead. Later papers [20,38] report results based on recording full sequences. We reverted to lookahead pairs because it is simple to implement and extremely efficient.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... (LFC).2
A somewhat different approach was taken in Hofmeyr [20], where the measure of anomalous behavior was based on Hamming distances between unknown sequences and their closest match in the normal database.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.