Application data consistency checking for anomaly based intrusion detection

Olivier Sarrouy, Eric Totel, Bernard Jouga

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Host-based intrusion detection systems may be coarsely divided into two categories. Misuse-based intrusion detection systems, which rely on a database of malicious behavior; and anomaly-based intrusion detection systems which rely on the comparison of the observed behavior of the monitored application with a previously built model of its normal behavior called the reference profile. In this last approach, the reference profile is often built on the basis of the sequence of system calls the application emits during its normal executions. Unfortunately, this approach allows attackers to remain undetected by mimicing the attempted behavior of the application. Furthermore, such intrusion detection systems cannot by nature detect anything but violations of the integrity of the control flow of an application. Although, there exist quite critical attacks which do not disturb the control flow of an application and thus remain undetected. We thus propose a different approach relying on the idea that attacks often break simple constraints on the data manipulated by the program. In this perspective, we first propose to define which data are sensitive to intrusions. Then we intend to extract the constraints applying on these data items, afterwards controlling them to detect intrusions. We finally introduce an implementation of such an approach, and some encouraging results.

Original languageEnglish
Title of host publicationStabilization, Safety, and Security of Distributed Systems - 11th International Symposium, SSS 2009, Proceedings
Pages726-740
Number of pages15
DOIs
Publication statusPublished - 1 Dec 2009
Externally publishedYes
Event11th International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2009 - Lyon, France
Duration: 3 Nov 20096 Nov 2009

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5873 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference11th International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2009
Country/TerritoryFrance
CityLyon
Period3/11/096/11/09

Fingerprint

Dive into the research topics of 'Application data consistency checking for anomaly based intrusion detection'. Together they form a unique fingerprint.

Cite this