Inferring a Distributed Application Behavior Model for Anomaly Based Intrusion Detection

被引:7
作者
Totel, Eric [1 ]
Hkimi, Mouna [2 ]
Hurfin, Michel [2 ]
Leslous, Mourad [2 ]
Labiche, Yvan [3 ]
机构
[1] CentraleSupelec, Ave Boulaie,CS 47601, F-35576 Cesson Sevigne, France
[2] INRIA, F-35042 Rennes, France
[3] Carleton Univ, 1125 Colonel Dr, Ottawa, ON K1S 5B6, Canada
来源
2016 12TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2016) | 2016年
关键词
Security; Intrusion Detection; Anomaly Detection; Distributed Application Modeling; Distributed Systems;
D O I
10.1109/EDCC.2016.13
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As distributed computations become more and more common in highly distributed environments like the cloud, intrusion detection systems have to follow these paradigms. Anomaly based intrusion detection systems in distributed systems usually rely on a total order of the observed events. However, such hypothesis is often too strong, as in a highly distributed environment the order of the observed events is partially unknown. This paper demonstrates it is possible to infer a distributed application behavior model for intrusion detection, relying only on a partial ordering of events. The originality of the proposed approach is to tackle the problem by combining two types of models that are usually used separately: an automaton modeling the distributed computation, and a list of temporal properties that the computation must comply with. Finally, we apply the approach on two examples, and assess the method on a real distributed application.
引用
收藏
页码:53 / 64
页数:12
相关论文
共 20 条
[1]  
[Anonymous], 1988, P 11 AUSTR COMP SCI
[2]  
[Anonymous], P 30 INT C SOFTW ENG
[3]  
Beschastnikh I., 2013, THESIS
[4]  
Beschastnikh I., 2012, ACM SIGOPS OPERATING, V45, P39, DOI DOI 10.1145/2094091.2094101
[5]  
Beschastnikh I., 2014, TECH REP
[6]   SYNTHESIS OF FINITE-STATE MACHINES FROM SAMPLES OF THEIR BEHAVIOR [J].
BIERMANN, AW ;
FELDMAN, JA .
IEEE TRANSACTIONS ON COMPUTERS, 1972, C 21 (06) :592-&
[7]  
Cimatti A., 2002, LNCS, V2404
[8]  
GARG V.K., 1996, PRINCIPLES DISTRIBUT
[9]  
Goubault-Larrecq J., 2008, LECT NOTES COMPUTER, V5289
[10]  
JARD C, 1994, INT CON DISTR COMP S, P396, DOI 10.1109/ICDCS.1994.302443