Building an Intrusion-Detection System to Detect Suspicious Process Behavior
نویسندگان
چکیده
As has been shown in S. Forrest's seminal work [1], there are Unix processes whose normal behavior can be modeled by a set of characteristic patterns, a pattern being a subsequence of system calls that a process can generate. Well-suited processes are network services such as ftpd or sendmail. Intrusion-detection systems that make use of this observation first need to build the table of characteristic patterns. The patterns are determined by letting the process invoke as many subcommands as possible, then extracting the patterns from the corresponding sequences of system calls. During realtime operation, a pattern-matching algorithm is applied to match on the fly the system calls generated by the process examined with entries of the pattern table. Based on how well the matching can be done, it is decided whether the sequence of system calls represents normal or anomalous behavior. As an analysis of intrusion-detection systems that are based on the above concepts [1,2,3] reveals, these systems share the same main components, but they differ in the way the individual components are implemented. Furthermore, each system uses some implicit parameters that are based on experimental observations and may only be applicable to the test cases examined. In our presentation, we will give an overview of the various techniques to implement the individual components, and assess their impact on the detection capability of the intrusion-detection system. Specifically, we will discuss the following components: ?? Recording system calls: System calls can be recorded either by using a tool such as ``trace'' or by activating the auditing system. The technique used may influence the overall system performance and the number of events recorded. ?? Generating training data: The intrusion-detection system needs to be trained to learn what ``normal'' behavior is. We differentiate between ``synthetic'' and ``real'' normal behavior. Synthetic normal behavior is generated by exercising a program in as many modes as possible and tracing its behavior. Real normal behavior corresponds to tracing the behavior of a program in a live user environment. ?? Building the process model: The process model is a pattern table that consists of either fixedor variable-length patterns. While the creation of the fixed-length pattern table is quite straightforward, various techniques can be used to build a table of variable-length patterns. ?? Comparing real process data with the process model: The goal of the detection component is to differentiate between normal and anomalous behavior. For doing so, the sequences of system calls generated by a process in real operation is matched with entries of the pattern table. Basically one can differentiate between two pattern-matching techniques: overlapping and juxtaposed pattern matching. ?? Detecting attacks: The number and the alignment of the unmatched events are the two main criteria used to differentiate between normal and anomalous behavior. The above components are not separate entities. They are interrelated, and the decision to implement a component in a certain way may influence the design choices available for other components. We will show these dependencies, and assess the advantages and disadvantages of the various implementations of the above components based on a series of experiments. The experiments were performed in a testbed environment [4] built specifically to compare the kind of intrusion-detection systems we are investigating.
منابع مشابه
Designing an Intelligent Intrusion Detection System in the Electronic Banking Industry Using Fuzzy Logic
One of the most important obstacles to using Internet banking is the lack of Stability of transactions and some misuse in the course of transactions it is financial. That is why preventing unauthorized access Crime detection is one of the major issues in financial institutions and banks. In this article, a system of intelligence has been designed that recognizes Suspicious and unusual behaviors...
متن کاملA Hybrid Framework for Building an Efficient Incremental Intrusion Detection System
In this paper, a boosting-based incremental hybrid intrusion detection system is introduced. This system combines incremental misuse detection and incremental anomaly detection. We use boosting ensemble of weak classifiers to implement misuse intrusion detection system. It can identify new classes types of intrusions that do not exist in the training dataset for incremental misuse detection. As...
متن کاملSoftware Decoys : Intrusion Detection and Countermeasures
—We introduce the notion of an intelligent software decoy, and provide both an architecture and event-based language for automatic implementation of them. Our decoys detect and respond to patterns of suspicious behavior, and maintain a repository of rules for behavior patterns and decoying actions. As an example, we construct a model of system behavior from an initial list of event types and th...
متن کاملA Lightweight Intrusion Detection System Based on Specifications to Improve Security in Wireless Sensor Networks
Due to the prevalence of Wireless Sensor Networks (WSNs) in the many mission-critical applications such as military areas, security has been considered as one of the essential parameters in Quality of Service (QoS), and Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper presents a lightweight Intrusion Detection System to prote...
متن کاملA Survey of Anomaly Detection Approaches in Internet of Things
Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes. In this ...
متن کاملMachine Learning for Network Intrusion Detection
In recent years, networks have become an increasingly valuable target of malicious attacks due to the increased amount of user data they contain. In defense, Network Intrusion Detection Systems (NIDSs) have been developed to detect and report suspicious activity (i.e. an attack). In this project, we explore unsupervised learning techniques for building NIDs, which only analyze unencrypted packe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1999