Application Data Consistency Checking for Anomaly Based Intrusion Detection

被引:0
|
作者
Sarrouy, Olivier [1 ]
Totel, Eric [1 ]
Jouga, Bernard [1 ]
机构
[1] Supelec, CS 47601, F-35576 Cesson Sevigne, France
来源
STABILIZATION, SAFETY, AND SECURITY OF DISTRIBUTED SYSTEMS, PROCEEDINGS | 2009年 / 5873卷
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Host-based intrusion detection systems may be coarsely divided into two categories. Misuse-based intrusion detection systems, which rely on a database of malicious behavior; and anomaly-based intrusion detection systems which rely on the comparison of the observed behavior of the monitored application with a previously built model of its normal behavior called the reference profile. In this last approach, the reference profile is often built on the basis of the sequence of system calls the application emits during its normal executions. Unfortunately, this approach allows attackers to remain undetected by mimicing the attempted behavior of the application. Furthermore, such intrusion detection systems cannot by nature detect anything but violations of the integrity of the control flow of an application. Although, there exist quite critical attacks which do not disturb the control flow of an application and thus remain undetected. We thus propose a different approach relying on the idea that attacks often break simple constraints on the data manipulated by the program. In this perspective, we first propose to define which data are sensitive to intrusions. Then we intend to extract the constraints applying on these data items, afterwards controlling them to detect intrusions. We finally introduce an implementation of such an approach, and some encouraging results.
引用
收藏
页码:726 / 740
页数:15
相关论文
共 50 条
  • [41] A new data normalization method for unsupervised anomaly intrusion detection
    Long-zheng Cai
    Jian Chen
    Yun Ke
    Tao Chen
    Zhi-gang Li
    Journal of Zhejiang University SCIENCE C, 2010, 11 : 778 - 784
  • [42] A new data normalization method for unsupervised anomaly intrusion detection
    Longzheng CAIJian CHENYun KETao CHENZhigang LI Engineering and Commerce CollegeSouthCentral University for NationalitiesWuhan China Guangdong Institute of Science and TechnologyZhuhai China
    Journal of Zhejiang University-Science C(Computers & Electronics), 2010, 11 (10) : 778 - 784
  • [43] Anomaly Based Unknown Intrusion Detection in Endpoint Environments
    Kim, Sujeong
    Hwang, Chanwoong
    Lee, Taejin
    ELECTRONICS, 2020, 9 (06) : 1 - 21
  • [44] Hierarchical anomaly based intrusion detection and localization in IoT
    Yahyaoui, Aymen
    Abdellatif, Takoua
    Attia, Rabah
    2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 108 - 113
  • [45] Anomaly Based Intrusion Detection through Temporal Classification
    Ooi, Shih Yin
    Tan, Shing Chiang
    Cheah, Wooi Ping
    NEURAL INFORMATION PROCESSING, ICONIP 2014, PT III, 2014, 8836 : 612 - 619
  • [46] Protocol based foresight anomaly intrusion detection system
    Tsai, MK
    Lin, SC
    Tseng, SS
    37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2003, : 493 - 500
  • [47] ANOMALY-BASED NETWORK INTRUSION DETECTION METHODS
    Nevlud, Pavel
    Bures, Miroslav
    Kapicak, Lukas
    Zdralek, Jaroslav
    ADVANCES IN ELECTRICAL AND ELECTRONIC ENGINEERING, 2013, 11 (06) : 468 - 474
  • [48] Anomaly intrusion detection based on dynamic cluster updating
    Oh, Sang-Hyun
    Lee, Won-Suk
    ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2007, 4426 : 737 - +
  • [49] Cross layer Anomaly based intrusion detection system
    Satam, Pratik
    2015 IEEE NINTH INTERNATIONAL CONFERENCE ON SELF-ADAPTIVE AND SELF-ORGANIZING SYSTEMS WORKSHOPS (SASOW), 2015, : 157 - 161
  • [50] A case-based approach to anomaly intrusion detection
    Micarelli, Alessandro
    Sansonetti, Giuseppe
    MACHINE LEARNING AND DATA MINING IN PATTERN RECOGNITION, PROCEEDINGS, 2007, 4571 : 434 - +