Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Detection and classification of intrusions and faults using sequences of system calls

Published: 01 December 2001 Publication History

Abstract

This paper investigates the use of sequences of system calls for classifying intrusions and faults induced by privileged processes in Unix. Classification is an essential capability for responding to an anomaly (attack or fault), since it gives the ability to associate appropriate responses to each anomaly type. Previous work using the well known dataset from the University of New Mexico (UNM) has demonstrated the usefulness of monitoring sequences of system calls for detecting anomalies induced by processes corresponding to several Unix Programs, such as sendmail, lpr, ftp, etc. Specifically, previous work has shown that the Anomaly Count of a running process, i.e., the number of sequences spawned by the process which are not found in the corresponding dictionary of normal activity for the Program, is a valuable feature for anomaly detection. To achieve Classification, in this paper we introduce the concept of Anomaly Dictionaries, which are the sets of anomalous sequences for each type of anomaly. It is verified that Anomaly Dictionaries for the UNM's sendmail Program have very little overlap, and can be effectively used for Anomaly Classification. The sequences in the Anomalous Dictionary enable a description of Self for the Anomalies, analogous to the definition of Self for Privileged Programs given by the Normal Dictionaries. The dependence of Classification Accuracy with sequence length is also discussed. As a side result, it is also shown that a hybrid scheme, combining the proposed classification strategy with the original Anomaly Counts can lead to a substantial improvement in the overall detection rates for the sendmail dataset. The methodology proposed is rather general, and can be applied to any situation where sequences of symbols provide an effective characterization of a phenomenon.

References

[1]
J. B. D. Cabrera, B. Ravichandran, and R. K. Mehra. Statistical Traffic Modeling for Network Intrusion Detection. In Proceedings of the Eighth International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems, pages 466-473, San Francisco, CA, August 2000. IEEE Computer Society.
[2]
W. Cohen. Fast effective rule induction. In Proceedings of the Twelfth International Conference on Machine Learning, 1995.
[3]
E. Eskin, W. Lee, and S. Stolfo. Modeling system call for intrusion detection using dynamic window sizes. In Proceedings of the 2001 DARPA Information Survivability Conference & Exposition, Anaheim, CA, June 2001.
[4]
S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff. A Sense of Self for Unix Processes. In Proceedings of the IEEE Symposium on Security and Privacy, pages 120-128, 1996.
[5]
K. Fukunaga. Introduction to Statistical Pattern Recognition. Academic Press, 1990.
[6]
A. K. Ghosh, A. Schwartzbard, and M. Schatz. Using program behavior profiles for intrusion detection. In Proceedings of the SANS Intrusion Detection Workshop, 1999.
[7]
G. G. Helmer, J. S. K. Wong, V. Hanavar, and L. Miller. Intelligent agents for intrusion detection. In Proceedings of the IEEE Information Technology Conference, Syracuse, NY, 1998.
[8]
S. A. Hofmeyr, S. Forrest, and A. Somayaji. Intrusion detection using sequences of system calls. Journal of Computer Security, 6:151-180, 1998.
[9]
S. Jajodia, C. McCollum, and P. Ammann. Trusted Recovery. Communications of the ACM, 42(7):71-75, July 1999.
[10]
C. Ko, G. Fink, and K. Levitt. Automated detection of vulnerabilities in privileged programs by execution monitoring. In Proceedings of the 10th Annual Computer Security Applications Conference, pages 134-144, December 1994.
[11]
W. Lee, S. Stolfo, and K. Mok. Adaptive Intrusion Detection: A Data Mining Approach. Artificial Intelligence Review, 16(6):533-567, December 2000.
[12]
W. Lee, S. J. Stolfo, and P. K. Chan. Learning Patterns from Unix Process Execution Traces for Intrusion Detection. In Proceedings of the AAAI Workshop on AI Methods in Fraud and Risk Management, pages 50-56, July 1997.
[13]
W. Lee and D. Xiang. Information theoretic measures for anomaly detection. In IEEE Symposium on Security and Privacy, Oakland, CA, May 2001.
[14]
C. Marceau. Characterizing the behavior of a program using multiple length n-grams. In Proceedings of the New Security Paradigms Workshops, September 2000.
[15]
R. K. Mukkamala, J. Gagnon, and S. Jajodia. Integrating Data Mining Techniques with Intrusion Detection. In V. Atluri and J. Hale, editors, Research Advances in Database and Information Systems Security, pages 33-46. Kluwer Publishers, 2000.
[16]
P. G. Neumann and P. A. Porras. Experience with EMERALD to date. In Proceedings of the Usenix Workshop on Intrusion Detection, 1999.
[17]
M. Stillerman, C. Marceau, and M. Stillman. Intrusion Detection for Distributed Applications. Communications of the ACM, 42(7):62-69, July 1999.
[18]
S. Warrender, S. Forrest, and B. Pearlmutter. Detecting intrusions using system calls: Alternative data models. In Proceedings of the IEEE Symposium on Security and Privacy, pages 133-145, 1999.
[19]
A. Wespi, H. Debar, M. Dacier, and M. Nassehi. Fixed-vs.variable-length patterns for detecting suspicious process behavior. Journal of Computer Security, 8:159-181, 2000.

Cited By

View all
  • (2024)Heterogeneous Domain Adaptation for Multistream Classification on Cyber Threat DataIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.318168221:1(1-11)Online publication date: 1-Jan-2024
  • (2024)Anomaly Detection System for Terminal-Level Data Access Behavior2024 9th International Conference on Signal and Image Processing (ICSIP)10.1109/ICSIP61881.2024.10671411(341-345)Online publication date: 12-Jul-2024
  • (2023)WiDeS: Wiping Detection using System-calls - An Anti-Forensic Resistant Approach2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)10.1109/TrustCom60117.2023.00231(1695-1703)Online publication date: 1-Nov-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM SIGMOD Record
ACM SIGMOD Record  Volume 30, Issue 4
December 2001
104 pages
ISSN:0163-5808
DOI:10.1145/604264
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 December 2001
Published in SIGMOD Volume 30, Issue 4

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)10
  • Downloads (Last 6 weeks)2
Reflects downloads up to 09 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Heterogeneous Domain Adaptation for Multistream Classification on Cyber Threat DataIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.318168221:1(1-11)Online publication date: 1-Jan-2024
  • (2024)Anomaly Detection System for Terminal-Level Data Access Behavior2024 9th International Conference on Signal and Image Processing (ICSIP)10.1109/ICSIP61881.2024.10671411(341-345)Online publication date: 12-Jul-2024
  • (2023)WiDeS: Wiping Detection using System-calls - An Anti-Forensic Resistant Approach2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)10.1109/TrustCom60117.2023.00231(1695-1703)Online publication date: 1-Nov-2023
  • (2023)On the Value of Sequence-Based System Call Filtering for Container Security2023 IEEE 16th International Conference on Cloud Computing (CLOUD)10.1109/CLOUD60044.2023.00043(296-307)Online publication date: Jul-2023
  • (2022)An Analytical Investigation of Anomaly Detection Methods Based on Sequence to Sequence Model in Satellite Power SubsystemSensors10.3390/s2205181922:5(1819)Online publication date: 25-Feb-2022
  • (2022)A Pattern Dictionary Method for Anomaly DetectionEntropy10.3390/e2408109524:8(1095)Online publication date: 9-Aug-2022
  • (2022)Advanced Persistent Threat Detection Using Data Provenance and Metric LearningIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.322178920:5(3957-3969)Online publication date: 14-Nov-2022
  • (2022)A comparative study on outlier detection techniques for noisy production data from unconventional shale reservoirsJournal of Natural Gas Science and Engineering10.1016/j.jngse.2022.104720105(104720)Online publication date: Sep-2022
  • (2022)Role-based lateral movement detection with unsupervised learningIntelligent Systems with Applications10.1016/j.iswa.2022.20010616(200106)Online publication date: Nov-2022
  • (2021)Interpretable Anomaly Detection in Event Sequences via Sequence Matching and Visual ComparisonIEEE Transactions on Visualization and Computer Graphics10.1109/TVCG.2021.309358528:12(4531-4545)Online publication date: 30-Jun-2021
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media