首页> 外文学位 >Gray-box anomaly detection using system call monitoring.
【24h】

Gray-box anomaly detection using system call monitoring.

机译:使用系统调用监视进行灰箱异常检测。

获取原文
获取原文并翻译 | 示例

摘要

Many host-based anomaly detection systems monitor a process by observing the system calls it makes, and comparing these calls to a model of normal behavior for the program that the process is executing. In this thesis we explore two novel approaches for constructing the normal behavior model for anomaly detection.; We introduce execution graph, which is the first model that both requires no static analysis of the program source or binary, and conforms to the control flow graph of the program. When used as the model in an anomaly detection system monitoring system calls, it (i) accepts only system call sequences that are consistent with the control flow graph of the program; (ii) is maximal given a set of training data, meaning that any extensions to the execution graph could permit some intrusions to go undetected. We formalize and prove these claims, and evaluate the performance of an anomaly detector using execution graphs.; Behavioral distance compares the behavior of a process to the behavior of another process that is executing on the same input but that either runs on a different operating system or runs a different program that has similar functionality. Assuming their diversity renders these processes vulnerable only to different attacks, a successful attack on one of them should induce a detectable increase in the "distance" between the behavior of the two processes. We propose two black-box approaches for measuring behavioral distance, the first inspired by evolutionary distance and the second using a new type of Hidden Markov Model.; We additionally build and evaluate a replicated system, which uses behavioral distance to protect Internet servers. Through trace-driven evaluations we show that we can achieve low false-alarm rates and moderate performance costs even when the system is tuned to detect very stealthy mimicry attacks.
机译:许多基于主机的异常检测系统通过观察进程发出的系统调用,并将这些调用与进程正在执行的程序的正常行为模型进行比较,来监视进程。本文探讨了两种构造异常行为正常行为模型的新颖方法。我们介绍执行图,这是第一个既不需要对程序源代码或二进制文件进行静态分析,又符合程序控制流程图的模型。当在监视系统调用的异常检测系统中用作模型时,它(i)仅接受与程序的控制流程图一致的系统调用序列; (ii)在给定一组训练数据的情况下最大,这意味着对执行图的任何扩展都可能使某些入侵无法被发现。我们对这些声明进行形式化和证明,并使用执行图评估异常检测器的性能。行为距离将一个进程的行为与在相同输入上执行但在不同操作系统上运行或运行具有类似功能的另一个程序的另一个进程的行为进行比较。假设它们的多样性使这些进程仅容易受到不同的攻击,那么对其中一个进程的成功攻击应该会导致两个进程的行为之间的“距离”明显增加。我们提出了两种用于测量行为距离的黑匣子方法,第一种是受进化距离的启发,第二种是使用新型的隐马尔可夫模型。我们还构建并评估了一个复制系统,该系统使用行为距离来保护Internet服务器。通过跟踪驱动的评估,我们表明,即使将系统调整为检测非常隐秘的模仿攻击,我们也可以实现较低的虚假警报率和适度的性能成本。

著录项

  • 作者

    Gao, Debin.;

  • 作者单位

    Carnegie Mellon University.;

  • 授予单位 Carnegie Mellon University.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2007
  • 页码 89 p.
  • 总页数 89
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 自动化技术、计算机技术;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号