Building an Application Data Behavior Model for Intrusion Detection

被引:0
|
作者
Sarrouy, Olivier [1 ]
Totel, Eric [1 ]
Jouga, Bernard [1 ]
机构
[1] Supelec, F-35576 Cesson Sevigne, France
来源
DATA AND APPLICATIONS SECURITY XXIII, PROCEEDINGS | 2009年 / 5645卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Application level intrusion detection systems usually rely oil the immunological approach. In this approach, the application behavior is compared at runtime with a previously learned application profile of the sequence of system calls it is allowed to emit. Unfortunately, this approach cannot detect anything but control flow violation and thus remains helpless in detecting the attacks that aim pure application data. In this paper, we propose an approach that would enhance the detection of such attacks. Our proposal relies on a data oriented behavioral model that builds the application profile out of dynamically extracted invariant constraints oil the application data items.
引用
收藏
页码:299 / 306
页数:8
相关论文
共 50 条
  • [31] Data mining descriptive model for intrusion detection systems
    Hentea, M
    Innovations Through Information Technology, Vols 1 and 2, 2004, : 1118 - 1119
  • [32] The Analysis of Application of Data Mining Technology in the System of Intrusion Detection
    Liu, Zhijun
    Pu, Xiaowei
    PROCEEDINGS OF 2014 2ND INTERNATIONAL CONFERENCE IN HUMANITIES, SOCIAL SCIENCES AND GLOBAL BUSINESS MANAGEMENT (ISSGBM 2014), VOL 28, 2014, 28 : 75 - 78
  • [33] The discretization algorithm for rough data and its application to intrusion detection
    Shi, Zhicai
    Xia, Yongxiang
    Wu, Fei
    Dai, Jian
    Journal of Networks, 2014, 9 (06) : 1380 - 1387
  • [34] Application Research on Data Mining Algorithm in Intrusion Detection System
    Wu, Weizu
    Liu, Liqun
    Xu, Bing
    3RD INTERNATIONAL CONFERENCE ON APPLIED ENGINEERING, 2016, 51 : 607 - 612
  • [35] Application and Performance Analysis of Data Preprocessing for Intrusion Detection System
    Jiang, Shuai
    Xu, Xiaolong
    SCIENCE OF CYBER SECURITY, SCISEC 2019, 2019, 11933 : 163 - 177
  • [36] Application Data Consistency Checking for Anomaly Based Intrusion Detection
    Sarrouy, Olivier
    Totel, Eric
    Jouga, Bernard
    STABILIZATION, SAFETY, AND SECURITY OF DISTRIBUTED SYSTEMS, PROCEEDINGS, 2009, 5873 : 726 - 740
  • [37] A New Model of Intrusion Detection Based on Data Warehouse and Data Mining
    Qi, Bei
    Dong, Yunfeng
    MANUFACTURING SCIENCE AND TECHNOLOGY, PTS 1-8, 2012, 383-390 : 303 - +
  • [38] A Building Block for Awareness in Technical Systems: Online Novelty Detection and Reaction With an Application in Intrusion Detection
    Gruhl, Christian
    Sick, Bernhard
    Wacker, Arno
    Tomforde, Sven
    Hahner, Jorg
    2015 IEEE 7TH INTERNATIONAL CONFERENCE ON AWARENESS SCIENCE & TECHNOLOGY (ICAST), 2015, : 194 - 200
  • [39] The Application of High Dimensional Data Mining Based on Big Data to Intrusion Detection
    Liu, Jinhua
    PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON MODELLING, SIMULATION AND APPLIED MATHEMATICS (MSAM2017), 2017, 132 : 169 - 171
  • [40] Towards Building Intrusion Detection Systems for Multivariate Time-Series Data
    Seong, ChangMin
    Song, YoungRok
    Hyun, Jiwung
    Cheong, Yun-Gyung
    SILICON VALLEY CYBERSECURITY CONFERENCE, SVCC 2021, 2022, 1536 : 45 - 56