首页> 外文会议>Stabilization, safety, and security of distributed systems >Application Data Consistency Checking for Anomaly Based Intrusion Detection
【24h】

Application Data Consistency Checking for Anomaly Based Intrusion Detection

机译:基于异常的入侵检测的应用数据一致性检查

获取原文
获取原文并翻译 | 示例

摘要

Host-based intrusion detection systems may be coarsely divided into two categories. Misuse-based intrusion detection systems, which rely on a database of malicious behavior; and anomaly-based intrusion detection systems which rely on the comparison of the observed behavior of the monitored application with a previously built model of its normal behavior called the reference profile. In this last approach, the reference profile is often built on the basis of the sequence of system calls the application emits during its normal executions. Unfortunately, this approach allows attackers to remain undetected by mimicing the attempted behavior of the application. Furthermore, such intrusion detection systems cannot by nature detect anything but violations of the integrity of the control flow of an application. Although, there exist quite critical attacks which do not disturb the control flow of an application and thus remain undetected. We thus propose a different approach relying on the idea that attacks often break simple constraints on the data manipulated by the program. In this perspective, we first propose to define which data are sensitive to intrusions. Then we intend to extract the constraints applying on these data items, afterwards controlling them to detect intrusions. We finally introduce an implementation of such an approach, and some encouraging results.
机译:基于主机的入侵检测系统可以大致分为两类。基于滥用的入侵检测系统,该系统依赖于恶意行为数据库;以及基于异常的入侵检测系统,该系统依赖于将被监视应用程序的观察到的行为与其先前构建的正常行为模型(称为参考配置文件)进行比较。在最后一种方法中,参考配置文件通常是基于应用程序在其正常执行期间发出的系统调用的顺序构建的。不幸的是,这种方法通过模仿应用程序的尝试行为,使攻击者无法被发现。此外,这种入侵检测系统本质上无法检测到任何东西,但违反了应用程序控制流的完整性。尽管存在相当关键的攻击,但是这些攻击不会干扰应用程序的控制流,因此仍然未被检测到。因此,我们提出了一种不同的方法,该方法依赖于这样的想法,即攻击通常会破坏对程序操纵的数据的简单约束。从这个角度来看,我们首先建议定义哪些数据对入侵敏感。然后,我们打算提取应用于这些数据项的约束,然后控制它们以检测入侵。我们最后介绍了这种方法的实现,以及一些令人鼓舞的结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号