Building an Application Data Behavior Model for Intrusion Detection

被引:0
|
作者
Sarrouy, Olivier [1 ]
Totel, Eric [1 ]
Jouga, Bernard [1 ]
机构
[1] Supelec, F-35576 Cesson Sevigne, France
来源
DATA AND APPLICATIONS SECURITY XXIII, PROCEEDINGS | 2009年 / 5645卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Application level intrusion detection systems usually rely oil the immunological approach. In this approach, the application behavior is compared at runtime with a previously learned application profile of the sequence of system calls it is allowed to emit. Unfortunately, this approach cannot detect anything but control flow violation and thus remains helpless in detecting the attacks that aim pure application data. In this paper, we propose an approach that would enhance the detection of such attacks. Our proposal relies on a data oriented behavioral model that builds the application profile out of dynamically extracted invariant constraints oil the application data items.
引用
收藏
页码:299 / 306
页数:8
相关论文
共 50 条
  • [41] Markov Graph Model Computation and Its Application to Intrusion Detection
    曾剑平
    郭东辉
    Journal of Donghua University(English Edition), 2007, (02) : 272 - 275
  • [42] APPLICATION RESEARCH ON INTRUSION DETECTION MODEL BASED ON PROTOCOL ANALYSIS
    Jia, Tao
    Cen, Lizhang
    Lu, Juncong
    INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY, PROCEEDINGS, 2009, : 90 - 92
  • [43] A generic model for an application based intrusion prevention detection system
    Anand, S
    Ramachandran, V
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2004, 19 (04): : 233 - 240
  • [44] A Hybrid Model of RST and DST with Its Application in Intrusion Detection
    Ye Qing
    Wu Xiaoping
    Liu Yongqing
    Huang Gaofeng
    2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 202 - 205
  • [45] A new data fusion model of intrusion detection-IDSFM
    Tian, JF
    Zhao, WD
    Du, RZ
    Zhang, Z
    PROCEEDINGS OF THE 11TH JOINT INTERNATIONAL COMPUTER CONFERENCE, 2005, : 73 - 78
  • [46] A new data fusion model of intrusion detection-IDSFP
    Tian, JF
    Zhao, WD
    Du, RZ
    Zhang, Z
    PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, 2005, 3758 : 371 - 382
  • [47] A Deep Learning Model for Network Intrusion Detection with Imbalanced Data
    Fu, Yanfang
    Du, Yishuai
    Cao, Zijian
    Li, Qiang
    Xiang, Wei
    ELECTRONICS, 2022, 11 (06)
  • [48] Design of Intrusion Detection Model Based on Data Mining Technology
    Li Yin-huan
    2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE), 2012, : 571 - 574
  • [49] Research on Intrusion Detection System Model Based on Data Mining
    Zhu Limiao
    Huang Hua
    Zheng Hao
    2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 113 - 116
  • [50] A two-dimensional data fusion model for intrusion detection
    Yu, Kun-Ming
    Wu, Ming-Feng
    PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 3970 - +