Date of Original Version
Abstract or Table of Contents
We introduce a notion, behavioral distance, for evaluating the extent to which processes—potentially running diﬀerent programs and executing on diﬀerent platforms—behave similarly in response to a common input. We explore behavioral distance as a means to detect an attack on one process that causes its behavior to deviate from that of another. We propose a measure of behavioral distance and a realization of this measure using the system calls emitted by processes. Through an empirical evaluation of this measure using three web servers on two diﬀerent platforms (Linux and Windows), we demonstrate that this approach holds promise for better intrusion detection with moderate overhead.