Application Data Consistency Checking for Anomaly Based Intrusion Detection

被引:0
|
作者
Sarrouy, Olivier [1 ]
Totel, Eric [1 ]
Jouga, Bernard [1 ]
机构
[1] Supelec, CS 47601, F-35576 Cesson Sevigne, France
来源
STABILIZATION, SAFETY, AND SECURITY OF DISTRIBUTED SYSTEMS, PROCEEDINGS | 2009年 / 5873卷
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Host-based intrusion detection systems may be coarsely divided into two categories. Misuse-based intrusion detection systems, which rely on a database of malicious behavior; and anomaly-based intrusion detection systems which rely on the comparison of the observed behavior of the monitored application with a previously built model of its normal behavior called the reference profile. In this last approach, the reference profile is often built on the basis of the sequence of system calls the application emits during its normal executions. Unfortunately, this approach allows attackers to remain undetected by mimicing the attempted behavior of the application. Furthermore, such intrusion detection systems cannot by nature detect anything but violations of the integrity of the control flow of an application. Although, there exist quite critical attacks which do not disturb the control flow of an application and thus remain undetected. We thus propose a different approach relying on the idea that attacks often break simple constraints on the data manipulated by the program. In this perspective, we first propose to define which data are sensitive to intrusions. Then we intend to extract the constraints applying on these data items, afterwards controlling them to detect intrusions. We finally introduce an implementation of such an approach, and some encouraging results.
引用
收藏
页码:726 / 740
页数:15
相关论文
共 50 条
  • [1] Anomaly intrusion detection based on clustering a data stream
    Oh, Sang-Hyun
    Kang, Jin-Suk
    Bytin, Yung-Cheol
    Jeong, Taikyeong T.
    Lee, Won-Suk
    INFORMATION SECURITY, PROCEEDINGS, 2006, 4176 : 415 - 426
  • [2] Model Checking for Data Anomaly Detection
    Ciobanu, Madalina G.
    Fasano, Fausto
    Martinelli, Fabio
    Mercaldo, Francesco
    Santone, Antonella
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS (KES 2019), 2019, 159 : 1277 - 1286
  • [3] Anomaly detection based Intrusion Detection
    Novikov, Dima
    Yampolskiy, Roman V.
    Reznik, Leon
    THIRD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, PROCEEDINGS, 2006, : 420 - +
  • [4] Clustering based on swarm intelligence with application to anomaly intrusion detection
    Feng, Y
    Wu, KG
    Wu, ZF
    Zhong, J
    Li, H
    Proceedings of the 11th Joint International Computer Conference, 2005, : 488 - 491
  • [5] Anomaly-based intrusion detection system for IoT application
    Bhavsar M.
    Roy K.
    Kelly J.
    Olusola O.
    Discover Internet of Things, 2023, 3 (01):
  • [6] Data preprocessing for anomaly based network intrusion detection: A review
    Davis, Jonathan J.
    Clark, Andrew J.
    COMPUTERS & SECURITY, 2011, 30 (6-7) : 353 - 375
  • [7] Anomaly detection based on unsupervised niche clustering with application to network intrusion detection
    Leon, E
    Nasraoui, F
    Gomez, J
    CEC2004: PROCEEDINGS OF THE 2004 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1 AND 2, 2004, : 502 - 508
  • [8] Fast Anomaly Detection based on Data Stream in Network Intrusion Detection System
    Yang, Yihong
    Xu, Xiaolong
    Wang, Lina
    Zhong, Weiyi
    Yan, Chao
    Qi, Lianyong
    PROCEEDINGS OF ACM TURING AWARD CELEBRATION CONFERENCE, ACM TURC 2021, 2021, : 87 - 91
  • [9] Inferring a Distributed Application Behavior Model for Anomaly Based Intrusion Detection
    Totel, Eric
    Hkimi, Mouna
    Hurfin, Michel
    Leslous, Mourad
    Labiche, Yvan
    2016 12TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2016), 2016, : 53 - 64
  • [10] An Application of Membrane Computing to Anomaly-Based Intrusion Detection System
    Idowu, Rufai Kazeem
    Maroosi, Ali
    Muniyandi, Ravie Chandren
    Othman, Zulaiha Ali
    4TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATICS (ICEEI 2013), 2013, 11 : 585 - 592