Learning Unknown Attacks - A Start
نویسندگان
چکیده
Since it is essentially impossible to write large-scale software without errors, any intrusion tolerant system must be able to tolerate rapid, repeated unknown attacks without exhausting its redundancy. Our system provides continued application services to critical users while under attack with a goal of less than 25% degradation of productivity. Initial experimental results are promising. It is not yet a general open solution. Specification-based behavior sensors (allowable actions, objects, and QoS) detect attacks. The system learns unknown attacks by relying on two characteristics of network-accessible software faults: attacks that exploit them must be repeatable (at least in a probabilistic sense) and, if known, attacks can be stopped at component boundaries. Random rejuvenation limits the scope of undetected errors. The current system learns and blocks single-stage unknown attacks against a protected web server by searching and testing service history logs in a Sandbox after a successful attack. We also have an initial classbased attack generalization technique that stops webserver buffer overflow attacks. We are working to extend both techniques.
منابع مشابه
Navigation of a Mobile Robot Using Virtual Potential Field and Artificial Neural Network
Mobile robot navigation is one of the basic problems in robotics. In this paper, a new approach is proposed for autonomous mobile robot navigation in an unknown environment. The proposed approach is based on learning virtual parallel paths that propel the mobile robot toward the track using a multi-layer, feed-forward neural network. For training, a human operator navigates the mobile robot in ...
متن کاملDesign of an Intrusion Detection System for Unknown-attacks based on Bio-inspired Algorithms
Signature-based Intrusion Detection System (IDS) can detect only known attacks that have signatures. As new unknown-attacks are appearing continuously, the detection of unknown-attacks has become the essential part of IDS. This paper presents a novel design of IDS by combining two existing bio-inspired machine learning algorithms; Artificial Immune System (AIS) and Ant Clustering Algorithm (ACA...
متن کاملMachine Learning for Intrusion Detection
Detection of unknown attacks in network traffic is gaining increasing importance as modern attacks are characterized by high variabilities and mutation rates. Traditional signature-based intrusion detection systems (IDS) are not able to detect unknown attacks due to failing availability of appropriate signatures. We present an alternative approach based on machine learning techniques which enab...
متن کاملEvaluation of ACA-based Intrusion Detection Systems for Unknown-attacks
Intrusion Detection System (IDS) monitors a network and detects users’ malicious activities. Since new unknown-attacks are appearing continuously, IDS must have capability of detecting attacks without any specific prior knowledge. Also many devices are connected on network and produce enormous large volumes of network data. Labeling enormous network data manually is impractical task. Therefore,...
متن کاملZDAR System: Defending Against the Unknown
Zero-day attacks are undetected through conventional signature-based defenses and hence posed a critical threat to corporate networks. They are unnoticed until a specific vulnerability is actually identified and reported. Zero-day attacks are difficult to defend against because it is mostly detected only after it has completed its course of action. Protecting networks, applications and systems ...
متن کامل