Detecting and Countering System Intrusions Using Software Wrappers
نویسندگان
چکیده
This paper introduces an approach that integrates intrusion detection (ID) techniques with software wrapping technology to enhance a system's ability to defend against intrusions. In particular, we employ the NAI Labs Generic Software Wrapper Toolkit to implement all or part of an intrusion detection system as ID wrappers. An ID wrapper is a software layer dynamically inserted into the kernel that can selectively intercept and analyze system calls performed by processes as well as respond to intrusive events. We have implemented several ID wrappers that employ three di erent major intrusion detection techniques. Also, we have combined di erent ID techniques by composing ID wrappers at run-time. We tested the individual and composed ID wrappers using several existing attacks and measured their impact on observed application performance. We conclude that intrusion detection algorithms can be easily encoded as wrappers that perform eÆciently inside the kernel. Also, kernel-resident ID wrappers can be easily managed, allowing cooperation among multiple combined techniques to enforce a coherent global ID policy. In addition, intrusion detection algorithms can bene t from the extra data made accessible by wrappers.
منابع مشابه
Ensemble Voting System for Anomaly Based Network Intrusion Detection
The growing dependence of modern society on telecommunication and information networks has become inevitable. Therefore, the security aspects of such networks play a strategic role in ensuring protection of data against misuse. Intrusion Detection systems (IDS) are meant to detect intruders who elude the “first line” protection. Data mining techniques are being used for building effective IDS. ...
متن کاملDetecting Anomalous and Unknown Intrusions Against Programs
The ubiquity of the Internet connection to desktops has been both boon to business as well as cause for concern for the security of digital assets that may be unknowingly exposed. Firewalls have been the most commonly deployed solution to secure corporate assets against intrusions, but rewalls are vulnerable to errors in con guration, ambiguous security policies, data-driven attacks through all...
متن کاملOn the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities
Many systems have been introduced to detect software intrusions by comparing the outputs and behavior of diverse replicas when they are processing the same, potentially malicious, input. When these replicas are constructed using off-the-shelf software products, it is assumed that they are diverse and not compromised simultaneously under the same attack. In this paper, we analyze vulnerabilities...
متن کاملUsing Operating System Wrappers to Increase the Resiliency to Commercial Firewalls
Operating system wrappers technology provides a means for providing fine grained controls on the operation of applications software. Application proxy firewalls can gain from this technology by wrapping the proxies, thus preventing bugs (or malicious software) in the proxy from subverting the intent of the firewall. This paper describes several experiments we performed with wrappers and firewal...
متن کاملAn approach for Anomaly based Intrusion detection System using SNORT
We all know that today we are dependent on computer technologies in any manner. As the use of technology is increases, risk associated with computer technology is also increases. Network security is the big challenge among the researchers. People are working in the field of network security from 1987 when Dorothy Denning published an intrusion detection model [2]. But till now we did not get an...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2000