@inproceedings{a59d6d69bd5a496f958385a61f2d4cb4,
title = "Instrumentation of open-source software for intrusion detection",
abstract = "A significant number of cyber assaults and intrusion attempts are made against open source software written in C, C++, or Java. Detecting all flaws in a large system is still a daunting, unrealistic task. The information assurance area known as {"}intrusion detection{"} (ID) senses unauthorized access attempts by monitoring key pieces of system data. There is a desire to at least detect intrusion attempts in order to stop them while in progress, or repair the damage at a later date. Most ID systems examine system log files, or monitor network traffic. This research presents a new approach to generating records for intrusion detection by means of instrumentation. Open source code such as a web server can be compiled and the execution path of the server can be observed externally in near real-time. This method thus creates a new data source for ID which can be incorporated into a discovery system.",
keywords = "Domain specific language, Instrumentation, Intrusion detection",
author = "William Mahoney and William Sousan",
year = "2007",
doi = "10.1007/978-3-540-77395-5_13",
language = "English (US)",
isbn = "3540773940",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "151--163",
booktitle = "Runtime Verification - 7th International Workshop, RV 2007, Revised Selected Papers",
note = "7th International Workshop on Runtime Verification, RV 2007 ; Conference date: 13-03-2007 Through 13-03-2007",
}