Intrusion Detection via System Call Traces C .
نویسندگان
چکیده
Unusual behavior in computer systems can be detected by monitoring the system calls being executed by programs. Analysis of the temporal ordering of these calls reveals that such anomalies are localized within traces and that normal program behavior can be described compactly using deterministic finite automata. omputer use leaves trails of activity that can reveal signatures of misuse as well as of legitimate activity. Depending on the audit method used, the data recorded can range from a given user’s keystrokes or commands, to the system resources used or the system calls made by some collection of processes. Once a security system has collected an audit trail, it can use that information in a variety of ways. (See the boxed text on page 41 for an overview of intrusion detection techniques.) In the ideal case, the system can analyze the trail online as it is created, flag any unusual, anomalous, or prohibited behavior immediately, and then initiate a response. If it must examine the trail off line, this can take place routinely during off-peak hours or when unusual behavior has been detected by some other means. There is a chance, in this case, that a particularly successful intruder could corrupt the trail and hide the intrusion. For this reason, a computationally fast online method is useful.
منابع مشابه
A Framework for Studying New Approaches to Anomaly Detection
In this work, we describe a new framework for an anomaly-based intrusion detection system using system call traces. System calls provide an interface between an application and the operating system’s kernel. Since a program frequently requests services via system calls, a trace of these system calls provides a rich profile of program behavior. But we need to use efficient and effective methods ...
متن کاملNetHost-sensor: Monitoring a target host's application via system calls
Intrusion detection has emerged as an important approach to network, host and application security. Network security includes analysing network packet payload and other inert network packet profiles for intrusive trends; whereas, host security may employ system logs for intrusion detection. In this paper, we contribute to the research community by tackling application security and attempt to de...
متن کاملIntelligent Agents for Intrusion Detection
This paper focuses on intrusion detection and countermeasures with respect to widely-used operating systems and networks. The design and architecture of an intrusion detection system built from distributed agents is proposed to implement an intelligent system on which data mining can be performed to provide global, temporal views of an entire networked system. A starting point for agent intelli...
متن کاملAutomated discovery of concise predictive rules for intrusion detection
This paper details an essential component of a multi-agent distributed knowledge network system for intrusion detection. We describe a distributed intrusion detection architecture, complete with a data warehouse and mobile and static agents for distributed problem-solving to facilitate building, monitoring, and analyzing global, spatio-temporal views of intrusions on large distributed systems. ...
متن کاملNetwork Intrusion detection by using PCA via SMO-SVM
As network attacks have increased in number and severity over the past few years, intrusion detection system (IDS) is increasingly becoming a critical component to secure the network. Due to large volumes of security audit data as well as complex and dynamic properties of intrusion behaviors, optimizing performance of IDS becomes an important open problem that is receiving more and more attenti...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1997