Anita K. Jones
University of Virginia
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Anita K. Jones.
annual computer security applications conference | 2001
Anita K. Jones; Song Li
We introduce a new method for detecting intrusions based on the temporal behavior of applications. It builds on an existing method of application intrusion detection developed at the University of New Mexico that uses a system call sequence as a signature. Intrusions are detected by comparing the signature of the intrusion and that of the normal application. But when the system call sequences generated by the intrusion and the normal application are sufficiently similar, this method cannot work. By extending system call signature to incorporate temporal information related to the application, we form a richer signature. Analysis shows that the temporal behavior for many applications is relatively stable. We exclude high variance data when creating a normal database to characterize an application with a temporal signature. It can then be the basis for future comparisons in an intrusion detection system. This paper discusses experiments that test the effectiveness of the temporal signature on different applications, alternative intrusions, and in various environments. The results show that by choosing appropriate analysis methods and experimentally adjusting the parameters, intrusions are readily detected. Finally, we give some comparisons between the temporal signature method and the system call method.
annual computer security applications conference | 2001
Anita K. Jones; Yu Lin
Traditionally, intrusion detection systems detect intrusions at the operating system (OS) level. We explore the possibility of detecting intrusion at the application level by using rich application semantics. We use short sequences of language library calls as signatures. We consider library call signatures to be more application-oriented than system call signatures because they are a more direct reflection of application code. Most applications are written in a higher-level language with an associated support library such as C or C++. We hypothesize that library call signatures can be used to detect attacks that cause perturbation in the application code. We are hopeful that this technique will be amenable to detecting attacks that are carried out by internal intruders, who are viewed as legitimate users by an operating system.
Communications of The ACM | 2013
Anita K. Jones
Considering the factors influencing the recent rapid increase in the number of postdoctoral positions in computer science.
Science | 2008
William A. Wulf; Anita K. Jones
Once Barack Obama becomes the 44th president of the United States in January 2009, he will, sooner or later, appoint individuals to science and technology policy positions within the executive branch of government. It seems as though every science- and engineering-related think tank either has published, or shortly will, a report calling on the new administration to appoint these people quickly and give them the authority and tools to do their job.
Communications of The ACM | 2017
Chitta Baral; Shih-Fu Chang; Brian Curless; Partha Dasgupta; Julia Hirschberg; Anita K. Jones
Seeking more effective strategies for training and nurturing CS postdocs to ensure their success.
Archive | 2000
Anita K. Jones; Robert S. Sielken
IEEE Computer | 2000
Anita K. Jones
technical symposium on computer science education | 2002
Anita K. Jones
Archive | 1999
Robert S. Sielken; Anita K. Jones
Archive | 1974
William A. Wulf; E B Cohen; W Corwm; Anita K. Jones; Roy Levin; C. Pierson; F. H. Pollack