Learning Execution Contexts from System Call Distribution for Anomaly Detection in Smart Embedded System

Cited 0 time in webofscience Cited 30 time in scopus
  • Hit : 131
  • Download : 0
Existing techniques used for anomaly detection do not fully utilize the intrinsic properties of embedded devices. In this paper, we propose a lightweight method for detecting anomalous executions using a distribution of system call frequencies. We use a cluster analysis to learn the legitimate execution contexts of embedded applications and then monitor them at run-time to capture abnormal executions. Our prototype applied to a real-world open-source embedded application shows that the proposed method can effectively detect anomalous executions without relying on sophisticated analyses or affecting the critical execution paths.
Publisher
IoTDI
Issue Date
2017-04-20
Language
English
Citation

2nd IEEE/ACM International Conference on Internet-of-Things Design and Implementation, IoTDI 2017, pp.191 - 196

DOI
10.1145/3054977.3054999
URI
http://hdl.handle.net/10203/269622
Appears in Collection
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0