Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Intrusion Detection via System Call Traces

Published: 01 September 1997 Publication History

Abstract

Computer use leaves trails of activity that can reveal signatures of misuse as well as of legitimate activity. Depending on the audit method used, one can record a user's keystrokes, the system resources used, or the system calls made by some collection of processes. The authors have done preliminary work on the analysis of system call traces, particularly their structure during normal and anomalous behavior, and have found the anomalies to be temporally localized. These techniques could eventually lead to an effective, automatic analysis and monitoring system, and might even be extensible to handle other kinds of anomalous behavior.

References

[1]
S. Forrest, et al., "A Sense of Self for Unix Processes," Proc. 1996 IEEE Symp. Security and Privacy, IEEE Computer Soc. Press, Los Alamitos, Calif., 1996, pp. 120-128.
[2]
I. Goldberg, et al., "A Secure Environment for Untrusted Helper Applications: Confining the Wily Hacker," 6th Usenix Security Symp., Usenix Assoc., Berkeley, Calif., 1996, pp. 1-13.
[3]
8LGM, {8lgm}-Advisory-22.UNIX.syslog.-Aug-1995, http://www.8lgm.org/advisories.html.
[4]
CERT, Syslog Vulnerability-A Workaround for Sendmail, ftp://info.cert.org/pub/cert_advisories/CA-95:13.syslog.vul, Oct. 19 1995.
[5]
D.E. Denning, Cryptography and Data Security, Addison Wesley Longman, Reading, Mass., 1992.
[6]
H.S. Teng K. Chen and S.C. Lu, "Security Audit Trail Analysis Using Inductively Generated Predictive Rules," Proc. Sixth Conf. Artificial Intelligence Applications, IEEE, Piscataway, N.J., March 1990, pp. 24-29.
[7]
G. Liepens and H. Vaccaro, "Intrusion Detection: Its Role and Validation," Computers and Security, Vol. 11, 1992, pp. 347-355.
[8]
K.L. Fox, et al., "A Neural Network Approach Towards Intrusion Detection," Proc. 13th Nat'l Computer Security Conf., Nat'l Inst. Standards and Technology, Washington, D.C., 1990, pp. 125-134.
[9]
C. Ko G. Fink and K. Levitt, "Automated Detection of Vulnerabilities in Privileged Programs by Execution Monitoring," Proc. 10th Annual Computer Security Applications Conf., IEEE Computer Soc. Press, Los Alamitos, Calif., 1994, pp. 134-144.
[10]
B. Mukherjee L.T. Heberlein and K. N. Levitt, "Network Intrusion Detection," IEEE Network, May-June 1994, pp. 26-41.
[11]
T.F. Lunt, et al., A Real-Time Intrusion Detection Expert System (IDES), tech. report, Computer Science Laboratory, SRI Int'l, Menlo Park, Calif., Feb. 1992.
[12]
S. Kumar and E.H. Spafford, A Software Architecture to Support Misuse Intrusion Detection, Tech. Report CSD-TR-95-009, Dept. of Computer Sciences, Purdue Univ., W. Lafayette, Ind., Mar. 1995.
[13]
I. Goldberg, et al., "A Secure Environment for Untrusted Helper Applications: Confining the Wily Hacker," 6th Usenix Security Symp., Usenix Assoc., Berkeley, Calif., 1996, pp. 1-13.

Cited By

View all
  • (2022)A Framework for Anomaly Detection in Time-Driven and Event-Driven Processes Using Kernel TracesIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2020.297846934:1(1-14)Online publication date: 1-Jan-2022
  • (2021)Methods for Host-based Intrusion Detection with Deep LearningDigital Threats: Research and Practice10.1145/34614622:4(1-29)Online publication date: 15-Oct-2021
  • (2021)Ask a(n)droid to tell you the odds: probabilistic security-by-contract for mobile devicesSoft Computing - A Fusion of Foundations, Methodologies and Applications10.1007/s00500-020-05299-425:3(2295-2314)Online publication date: 1-Feb-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image IEEE Software
IEEE Software  Volume 14, Issue 5
September 1997
104 pages

Publisher

IEEE Computer Society Press

Washington, DC, United States

Publication History

Published: 01 September 1997

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 04 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2022)A Framework for Anomaly Detection in Time-Driven and Event-Driven Processes Using Kernel TracesIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2020.297846934:1(1-14)Online publication date: 1-Jan-2022
  • (2021)Methods for Host-based Intrusion Detection with Deep LearningDigital Threats: Research and Practice10.1145/34614622:4(1-29)Online publication date: 15-Oct-2021
  • (2021)Ask a(n)droid to tell you the odds: probabilistic security-by-contract for mobile devicesSoft Computing - A Fusion of Foundations, Methodologies and Applications10.1007/s00500-020-05299-425:3(2295-2314)Online publication date: 1-Feb-2021
  • (2019)A Survey of Intrusion Detection Systems Leveraging Host DataACM Computing Surveys10.1145/334438252:6(1-35)Online publication date: 14-Nov-2019
  • (2017)Long-Span Program Behavior Modeling and Attack DetectionACM Transactions on Privacy and Security10.1145/310576120:4(1-28)Online publication date: 20-Sep-2017
  • (2017)Virtual Machine Introspection Based SSH HoneypotProceedings of the 4th Workshop on Security in Highly Connected IT Systems10.1145/3099012.3099016(13-18)Online publication date: 19-Jun-2017
  • (2017)Pinpointing VulnerabilitiesProceedings of the 2017 ACM on Asia Conference on Computer and Communications Security10.1145/3052973.3053033(334-345)Online publication date: 2-Apr-2017
  • (2016)Program Anomaly DetectionProceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security10.1145/2976749.2976750(1853-1854)Online publication date: 24-Oct-2016
  • (2015)Unearthing Stealthy Program Attacks Buried in Extremely Long Execution PathsProceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security10.1145/2810103.2813654(401-413)Online publication date: 12-Oct-2015
  • (2015)Detection and classification of malicious JavaScript via attack behavior modellingProceedings of the 2015 International Symposium on Software Testing and Analysis10.1145/2771783.2771814(48-59)Online publication date: 13-Jul-2015
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media