【24h】

Gray-Box Extraction of Execution Graphs for Anomaly Detection

机译:用于异常检测的执行图的灰箱提取

获取原文
获取原文并翻译 | 示例

摘要

Many host-based anomaly detection systems monitor a process by observing the system calls it makes, and comparing these calls to a model of behavior for the program that the process should be executing. In this paper we introduce a new model of system call behavior, called an execution graph. The execution graph is the first such model that both requires no static analysis of the program source or binary, and conforms to the control flow graph of the program. When used as the model in an anomaly detection system monitoring system calls, it offers two strong properties: (ⅰ) it accepts only system call sequences that are consistent with the control flow graph of the program; (ⅱ) it is maximal given a set of training data, meaning that any extensions to the execution graph could permit some intrusions to go undetected. In this paper, we formalize and prove these claims. We additionally evaluate the performance of our anomaly detection technique.
机译:许多基于主机的异常检测系统通过观察进程发出的系统调用,并将这些调用与进程应执行的程序的行为模型进行比较,来监视进程。在本文中,我们介绍了一种新的系统调用行为模型,称为执行图。执行图是第一个这样的模型,既不需要对程序源或二进制文件进行静态分析,又符合程序的控制流程图。当在异常检测系统监视系统调用中用作模型时,它具有两个强大的特性:(ⅰ)它仅接受与程序的控制流程图一致的系统调用序列; (ⅱ)在给定一组训练数据的情况下最大,这意味着对执行图的任何扩展都可能使某些入侵未被发现。在本文中,我们对这些主张进行形式化和证明。我们还评估了异常检测技术的性能。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号