Abstract | ||
---|---|---|
Model based intrusion detection mechanisms have produced encouraging results for reduced false alarms. This paper extends our earlier work, where we reported for sandboxing Linux 2.6 using code generated from policies. Here we pursue the problem of code generation from a set of policies extracted from a domain model. Such a technique can support the safeguarding of system resources. We also present some of the features of the tool currently under development to automate the sandboxing process. |
Year | DOI | Venue |
---|---|---|
2009 | 10.1109/EMS.2009.42 | Athens |
Keywords | Field | DocType |
sandboxing linux kernel,executable code,system resource,domain model,reduced false alarm,translating security policy,earlier work,intrusion detection mechanism,code generation,sandboxing linux,sandboxing process,probability density function,linux,data mining,xml,generators,sandboxing,kernel,intrusion detection,code generator,security,security policy,linux kernel | Sandbox (computer security),Programming language,False alarm,Computer science,Code generation,Security policy,Intrusion detection system,Operating system,Domain model,Executable,Linux kernel | Conference |
ISSN | ISBN | Citations |
2473-3539 | 978-0-7695-3886-0 | 0 |
PageRank | References | Authors |
0.34 | 4 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Hrushikesha Mohanty | 1 | 195 | 25.78 |
VenkataSwamy, M. | 2 | 5 | 1.76 |
srini ramaswamy | 3 | 337 | 45.77 |
R. K. Shyamasundar | 4 | 777 | 118.76 |