PROBE: A Process Behavior-Based Host Intrusion Prevention System
نویسندگان
چکیده
Attacks using vulnerabilities are considered nowadays a severe threat. Thus, a host needs a device that monitors system activities for malicious behaviors and blocks those activities to protect itself. In this paper, we introduce PROcess BEhavior (PROBE), which monitors processes running on a host to identify abnormal process behaviors. PROBE makes a process tree using only process creation relationship, and then it measures each edge weight to determine whether the invocation of each child process causes an abnormal behavior. PROBE has low processing overhead when compared with existing intrusion detections which use sequences of system calls. In the evaluation on a representative set of critical security vulnerabilities, PROBE shows desirable and practical intrusion prevention capabilities estimating that only 5% false-positive and 5% false-negative. Therefore, PROBE is a heuristic approach that can also detect unknown attacks, and it is not only light-weight but also accurate.
منابع مشابه
Designing an Intelligent Intrusion Detection System in the Electronic Banking Industry Using Fuzzy Logic
One of the most important obstacles to using Internet banking is the lack of Stability of transactions and some misuse in the course of transactions it is financial. That is why preventing unauthorized access Crime detection is one of the major issues in financial institutions and banks. In this article, a system of intelligence has been designed that recognizes Suspicious and unusual behaviors...
متن کاملNetwork Intrusion Detection System Using Neural Network Classification of Attack Behavior
Intrusion Detection Systems (IDS) have become a necessity in computer security systems because of the increase in unauthorized accesses and attacks. Intrusion Detection is a major component in computer security systems that can be classified as Host-based Intrusion Detection System (HIDS), which protects a certain host or system and Network-based Intrusion detection system (NIDS), which protect...
متن کاملIntrusion Detection and Prevention in Cloud Computing using Genetic Algorithm
High level security is an essentially required in the communication and information sharing on the network clouds. Intrusion detection system (IDS) is being used to detect violations and malicious behavior over networks and hosts. Purpose of our paper is to provide an Intrusion detection system to detect and prevent the malicious behavior on the cloud computing. We propose an intrusion detectio...
متن کاملHost Intrusion Detection System Comparison
What is the difference between a host-based intrusion detection system and a you agree to receive emails regarding relevant products and special offers. Agentless network-based threat detection and protection (Network IPS). delivers a consistent management experience across Data Center Security products. configuration monitoring, consolidated event logging, and file and system tamper a combinat...
متن کاملAutomated Protection of End-Systems Against Known Attacks
Many users do not maintain their systems and hence these systems remain vulnerable. An evidence for this is given by the German Honeypot Project that identified from November 2004 to January 2005 over 100 active botnets, some with up to 50 000 compromised hosts. To efficiently protect users’ end-systems we propose the operation of a network-based intrusion prevention overlay network that analyz...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008