Inferring a Distributed Application Behavior Model for Anomaly Based Intrusion Detection

  • Eric Totel
  • , Mouna Hkimi
  • , Michel Hurfin
  • , Mourad Leslous
  • , Yvan Labiche

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

As distributed computations become more and more common in highly distributed environments like the cloud, intrusion detection systems have to follow these paradigms. Anomaly based intrusion detection systems in distributed systems usually rely on a total order of the observed events. However, such hypothesis is often too strong, as in a highly distributed environment the order of the observed events is partially unknown. This paper demonstrates it is possible to infer a distributed application behavior model for intrusion detection, relying only on a partial ordering of events. The originality of the proposed approach is to tackle the problem by combining two types of models that are usually used separately: an automaton modeling the distributed computation, and a list of temporal properties that the computation must comply with. Finally, we apply the approach on two examples, and assess the method on a real distributed application.

Original languageEnglish
Title of host publicationProceedings - 2016 12th European Dependable Computing Conference, EDCC 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages53-64
Number of pages12
ISBN (Electronic)9781509015825
DOIs
Publication statusPublished - 9 Dec 2016
Externally publishedYes
Event12th European Dependable Computing Conference, EDCC 2016 - Gothenburg, Sweden
Duration: 5 Sept 20169 Sept 2016

Publication series

NameProceedings - 2016 12th European Dependable Computing Conference, EDCC 2016

Conference

Conference12th European Dependable Computing Conference, EDCC 2016
Country/TerritorySweden
CityGothenburg
Period5/09/169/09/16

Keywords

  • Anomaly Detection
  • Distributed Application Modeling
  • Distributed Systems
  • Intrusion Detection
  • Security

Fingerprint

Dive into the research topics of 'Inferring a Distributed Application Behavior Model for Anomaly Based Intrusion Detection'. Together they form a unique fingerprint.

Cite this