首页> 外文期刊>Future generation computer systems >Unifying intrusion detection and forensic analysis via provenance awareness
【24h】

Unifying intrusion detection and forensic analysis via provenance awareness

机译:通过出处识别统一入侵检测和法医分析

获取原文
获取原文并翻译 | 示例
       

摘要

The existing host-based intrusion detection methods are mainly based on recording and analyzing the system calls of the invasion processes (such as exploring the sequences of system calls and their occurring probabilities). However, these methods are not efficient enough on the detection precision as they do not reveal the inherent intrusion events in detail (e.g., where are the system vulnerabilities and what causes the invasion are both not mentioned). On the other hand, though the log-based forensic analysis can enhance the understanding of how these invasion processes break into the system and what files are affected by them, it is a very cumbersome process to manually acquire information from logs which consist of the users' normal behavior and intruders' illegal behavior together. This paper proposes to use provenance, the history or lineage of an object that explicitly represents the dependency relationship between the damaged files and the intrusion processes, rather than the underlying system calls, to detect and analyze intrusions. Provenance more accurately reveals and records the data and control flow between files and processes, reducing the potential false alarm caused by system call sequences. Moreover, the warning report during intrusion can explicitly output system vulnerabilities and intrusion sources, and provide detection points for further provenance graph based forensic analysis. Experimental results show that this framework can identify the intrusion with high detection rate, lower false alarm rate, and smaller detection time overhead compared to traditional system call based method. In addition, it can analyze the system vulnerabilities and attack sources quickly and accurately.
机译:现有的基于主机的入侵检测方法主要基于对入侵过程的系统调用进行记录和分析(例如探索系统调用的顺序及其发生的概率)。但是,这些方法在检测精度上不够有效,因为它们没有详细揭示固有的入侵事件(例如,系统漏洞在哪里以及导致入侵的原因均未提及)。另一方面,尽管基于日志的取证分析可以增进对这些入侵过程如何​​侵入系统以及它们受哪些文件影响的理解,但是从包含用户的日志中手动获取信息是非常麻烦的过程将“正常行为与入侵者”的非法行为放在一起。本文提出使用对象的来源,其历史或沿袭来明确表示受损文件与入侵过程之间的依赖关系,而不是使用底层系统调用,来检测和分析入侵。来源更准确地显示和记录文件和进程之间的数据以及控制流,从而减少了由系统调用序列引起的潜在错误警报。此外,入侵期间的警告报告可以显式输出系统漏洞和入侵源,并为进一步的基于物证图的法​​医分析提供检测点。实验结果表明,与传统的基于系统调用的方法相比,该框架能够以较高的检测率,较低的误报率和较小的检测时间开销识别入侵。另外,它可以快速,准确地分析系统漏洞和攻击源。

著录项

  • 来源
    《Future generation computer systems》 |2016年第8期|26-36|共11页
  • 作者单位

    School of Computer, Wuhan National Laboratory for Optoelectronics, Huazhong University of Science and Technology, Wuhan 430074, PR China;

    School of Computer, Wuhan National Laboratory for Optoelectronics, Huazhong University of Science and Technology, Wuhan 430074, PR China;

    School of Computer, Wuhan National Laboratory for Optoelectronics, Huazhong University of Science and Technology, Wuhan 430074, PR China;

    School of Computer, Wuhan National Laboratory for Optoelectronics, Huazhong University of Science and Technology, Wuhan 430074, PR China;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Provenance; Intrusion detection; Forensic analysis; False alarm;

    机译:种源入侵检测;法医分析;错误警报;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号