首页> 外文会议>Risks and Security of Internet and Systems (CRiSIS), 2009 >SIDAN: A tool dedicated to software instrumentation for detecting attacks on non-control-data
【24h】

SIDAN: A tool dedicated to software instrumentation for detecting attacks on non-control-data

机译:SIDAN:一种专用于软件检测的工具,用于检测对非控制数据的攻击

获取原文

摘要

Anomaly based intrusion detection systems rely on the build of a normal behavior model. When a deviation from this normal behavior is detected, an alert is raised. This anomaly approach, unlike the misuse approach, is able to detect unknown attacks. A basic technique to build such a model for a program is to use the system call sequences of the process. To improve the accuracy and completeness of this detection model, we can add information related to the system call, such as its arguments or its execution context. But even then, attacks that target non-control-data may be missed and attacks on control-data may be adapted to bypass the detection mechanism using evasion techniques. We propose in this article an approach that focuses on the detection of non-control-data attacks. Our approach aims at exploiting the internal state of a program to detect a memory corruption on non-control-data that could lead to an illegal system call. To achieve this, we propose to build a data-oriented detection model by statically analyzing a program source code. This model is used to instrument the program by adding reasonableness checks that verify the consistent state of the data items the system calls depend on. We thus argue that it is possible to detect a program misuse issued by a non-control-data attack inside the program during its execution. While keeping a low overhead, this approach allows to detect non-control-data attacks.
机译:基于异常的入侵检测系统依赖于正常行为模型的构建。当检测到偏离此正常行为时,将发出警报。与滥用方法不同,此异常方法能够检测未知攻击。为程序构建此类模型的基本技术是使用流程的系统调用序列。为了提高此检测模型的准确性和完整性,我们可以添加与系统调用有关的信息,例如其参数或执行上下文。但是即使那样,也可能会错过针对非控制数据的攻击,并且针对控制数据的攻击可能会改编为使用规避技术绕过检测机制。我们在本文中提出了一种专注于检测非控制数据攻击的方法。我们的方法旨在利用程序的内部状态来检测可能导致非法系统调用的非控制数据上的内存损坏。为此,我们建议通过静态分析程序源代码来构建面向数据的检测模型。通过添加合理性检查来验证系统调用所依赖的数据项的一致状态,该模型可用于对程序进行检测。因此,我们认为可以检测到在程序执行期间由程序内部的非控制数据攻击所引起的程序滥用。在保持较低开销的同时,此方法允许检测非控制数据攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号