Dataflow anomaly detection

被引:47
作者
Bhatkar, Sandeep [1 ]
Chaturvedi, Abhishek [1 ]
Sekar, R. [1 ]
机构
[1] SUNY Stony Brook, Dept Comp Sci, Stony Brook, NY 11794 USA
来源
2006 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS | 2006年
关键词
D O I
10.1109/SP.2006.12
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Beginning with the work of Forrest et al, several researchers have developed intrusion detection techniques based on modeling program behaviors in terms of system calls. A weakness of these techniques is that they focus on control flows involving system calls, but not their arguments. This weakness makes them susceptible to several classes of attacks, including attacks on security-critical data, race-condition and symbolic link attacks, and mimicry attacks. To address this weakness, we develop a new approach for learning dataflow behaviors of programs. The novelty in our approach, as compared to previous system-call argument learning techniques, is that it learns temporal properties involving the arguments of different system calls, thus capturing the flow of security-sensitive data through the program. An interesting aspect of our technique is that it can be uniformly layered on top of most existing control-flow models, and can leverage control-flow contexts to significantly increase the precision of dataflows captured by the model. This contrasts with previous system-call argument learning techniques that did not leverage control-flow information, and moreover, were focused on learning statistical properties of individual system call arguments. Through experiments, we show that temporal properties enable detection of many attacks that aren't detected by previous approaches. Moreover they support formal reasoning about security assurances that can be provided when a program follows its dataflow behavior model, e.g., tar would read only files located within a directory specified as a command-line argument.
引用
收藏
页码:48 / +
页数:2
相关论文
共 34 条
[1]  
AMMONS G, 2002, ACM S PRINC PROGR LA
[2]  
Bishop M, 1996, COMPUT SYST, V9, P131
[3]  
*CERT CC, 2001, CA200133 CERT CC WUF
[4]  
CHEN H, 2004, NETW DISTR SYST SEC
[5]  
CHEN S, 2005, USENIX SEC S BALT MD
[6]  
FENG H, 2003, IEEE S SEC PRIV MAY
[7]  
Feng HH, 2004, P IEEE S SECUR PRIV, P194
[8]  
Gao D, 2004, USENIX ASSOCIATION PROCEEDINGS OF THE 13TH USENIX SECURITY SYMPOSIUM, P103
[9]  
Gao Debin, 2004, P 11 ACM C COMP COMM, P318, DOI DOI 10.1145/1030083.1030126
[10]  
GHOSH A, 1999, USENIX SEC S WASH DC