Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Anita K. Jones is active.

Publication


Featured researches published by Anita K. Jones.


annual computer security applications conference | 2001

Temporal signatures for intrusion detection

Anita K. Jones; Song Li

We introduce a new method for detecting intrusions based on the temporal behavior of applications. It builds on an existing method of application intrusion detection developed at the University of New Mexico that uses a system call sequence as a signature. Intrusions are detected by comparing the signature of the intrusion and that of the normal application. But when the system call sequences generated by the intrusion and the normal application are sufficiently similar, this method cannot work. By extending system call signature to incorporate temporal information related to the application, we form a richer signature. Analysis shows that the temporal behavior for many applications is relatively stable. We exclude high variance data when creating a normal database to characterize an application with a temporal signature. It can then be the basis for future comparisons in an intrusion detection system. This paper discusses experiments that test the effectiveness of the temporal signature on different applications, alternative intrusions, and in various environments. The results show that by choosing appropriate analysis methods and experimentally adjusting the parameters, intrusions are readily detected. Finally, we give some comparisons between the temporal signature method and the system call method.


annual computer security applications conference | 2001

Application intrusion detection using language library calls

Anita K. Jones; Yu Lin

Traditionally, intrusion detection systems detect intrusions at the operating system (OS) level. We explore the possibility of detecting intrusion at the application level by using rich application semantics. We use short sequences of language library calls as signatures. We consider library call signatures to be more application-oriented than system call signatures because they are a more direct reflection of application code. Most applications are written in a higher-level language with an associated support library such as C or C++. We hypothesize that library call signatures can be used to detect attacks that cause perturbation in the application code. We are hopeful that this technique will be amenable to detecting attacks that are carried out by internal intruders, who are viewed as legitimate users by an operating system.


Communications of The ACM | 2013

The explosive growth of postdocs in computer science

Anita K. Jones

Considering the factors influencing the recent rapid increase in the number of postdoctoral positions in computer science.


Science | 2008

A call to serve.

William A. Wulf; Anita K. Jones

Once Barack Obama becomes the 44th president of the United States in January 2009, he will, sooner or later, appoint individuals to science and technology policy positions within the executive branch of government. It seems as though every science- and engineering-related think tank either has published, or shortly will, a report calling on the new administration to appoint these people quickly and give them the authority and tools to do their job.


Communications of The ACM | 2017

Ask not what your postdoc can do for you ...

Chitta Baral; Shih-Fu Chang; Brian Curless; Partha Dasgupta; Julia Hirschberg; Anita K. Jones

Seeking more effective strategies for training and nurturing CS postdocs to ensure their success.


Archive | 2000

Computer System Intrusion Detection: A Survey1

Anita K. Jones; Robert S. Sielken


IEEE Computer | 2000

The challenge of building survivable information-intensive systems

Anita K. Jones


technical symposium on computer science education | 2002

The curious ways of professional cultures and the "two-body opportunity"

Anita K. Jones


Archive | 1999

Application Intrusion Detection Systems: The Next Step

Robert S. Sielken; Anita K. Jones


Archive | 1974

Hydra: the kernel of a multtprocessing operating system commun

William A. Wulf; E B Cohen; W Corwm; Anita K. Jones; Roy Levin; C. Pierson; F. H. Pollack

Collaboration


Dive into the Anita K. Jones's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Brian Curless

University of Washington

View shared research outputs
Top Co-Authors

Avatar

C. Pierson

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Chitta Baral

Arizona State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Roy Levin

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yu Lin

University of Virginia

View shared research outputs
Researchain Logo
Decentralizing Knowledge