Building an application data behavior model for intrusion detection

Olivier Sarrouy, Eric Totel, Bernard Jouga

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Application level intrusion detection systems usually rely on the immunological approach. In this approach, the application behavior is compared at runtime with a previously learned application profile of the sequence of system calls it is allowed to emit. Unfortunately, this approach cannot detect anything but control flow violation and thus remains helpless in detecting the attacks that aim pure application data. In this paper, we propose an approach that would enhance the detection of such attacks. Our proposal relies on a data oriented behavioral model that builds the application profile out of dynamically extracted invariant constraints on the application data items.

Original languageEnglish
Title of host publicationData and Applications Security XXIII - 23rd Annual IFIP WG 11.3 Working Conference, Proceedings
Pages299-306
Number of pages8
DOIs
Publication statusPublished - 2 Nov 2009
Externally publishedYes
Event23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security - Montreal, QC, Canada
Duration: 12 Jul 200915 Jul 2009

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5645 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security
Country/TerritoryCanada
CityMontreal, QC
Period12/07/0915/07/09

Fingerprint

Dive into the research topics of 'Building an application data behavior model for intrusion detection'. Together they form a unique fingerprint.

Cite this