A Grid System Detecting Internal Malicious Behaviors at System Call Level

نویسندگان

  • Fang-Yie Leu
  • Yi-Ting Hsiao
چکیده

In our previous work, we developed a security system which detects malicious behaviors at systemcall level. It first creates users’ personal profiles for all users of a close environment and an attacker profile for all hackers to keep track of their usage behaviors as the computer forensic features, and then determines whether or not a legally login user u is the account holder or a hacker by comparing u’s current computer usage behaviors with the computer forensic features collected in u’s personal profiles and the attacker profile. In this study, we implement this security system by using a grid and parallel Message Passing Interface. Experimental results show that the grid system’s user identification accuracy is 94%, the accuracy on detecting internal malicious attempts is up to 97% and the response time is less than 0.45 sec, implying that it can prevent a protected system from internal attacks effectively and efficiently.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Layered Architecture for Detecting Malicious Behaviors

We address the semantic gap problem in behavioral monitoring by using hierarchical behavior graphs to infer high-level behaviors from myriad low-level events. Our experimental system traces the execution of a process, performing data-flow analysis to identify meaningful actions such as “proxying”, “keystroke logging”, “data leaking”, and “downloading and executing a program” from complex combin...

متن کامل

A hybrid approach for database intrusion detection at transaction and inter-transaction levels

Nowadays, information plays an important role in organizations. Sensitive information is often stored in databases. Traditional mechanisms such as encryption, access control, and authentication cannot provide a high level of confidence. Therefore, the existence of Intrusion Detection Systems in databases is necessary. In this paper, we propose an intrusion detection system for detecting attacks...

متن کامل

Detection and Classification of Malicious Processes Using System Call Analysis

Detection and Classification of Malicious Processes Using System Call Analysis Raymond J. Canzanese, Jr. Moshe Kam, Ph.D. and Spiros Mancoridis, Ph.D. Despite efforts to mitigate the malware threat, the proliferation of malware continues, with recordsetting numbers of malware samples being discovered each quarter. Malware are any intentionally malicious software, including software designed for...

متن کامل

A Security Monitoring Framework For Virtualization Based HEP Infrastructures

High Energy Physics (HEP) distributed computing infrastructures require automatic tools to monitor, analyze and react to potential security incidents. These tools should collect and inspect data such as resource consumption, logs and sequence of system calls for detecting anomalies that indicate the presence of a malicious agent. They should also be able to perform automated reactions to attack...

متن کامل

Using Provenance Patterns to Vet Sensitive Behaviors in Android Apps

We propose Dagger, a lightweight system to dynamically vet sensitive behaviors in Android apps. Dagger avoids costly instrumentation of virtual machines or modifications to the Android kernel. Instead, Dagger reconstructs the program semantics by tracking provenance relationships and observing apps’ runtime interactions with the phone platform. More specifically, Dagger uses three types of low-...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Internet Serv. Inf. Secur.

دوره 4  شماره 

صفحات  -

تاریخ انتشار 2014