Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1866898.1866910acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
short-paper

Cost-aware systemwide intrusion defense via online forensics and on-demand detector deployment

Published: 04 October 2010 Publication History
  • Get Citation Alerts
  • Abstract

    Balancing the coverage benefits of deploying multiple types of intrusion detection systems against their performance and false alarm costs is an important problem with practical ramifications for runtime security policy. In this position paper, we present an approach to "on-demand" deployment of intrusion detection systems by balancing detection coverage against cost and deploying an IDS only when it is needed. The proposed approach relies on often easy to detect symptoms of attacks, e.g., participation in a botnet or DDoS, and works backwards by iteratively deploying increasingly more localized and powerful detectors closer to the initial attack vector. We accomplish this by characterizing multiple IDS systems in a uniform framework based on their costs and detection capabilities and integrating them, for the first time, into an online system-wide forensics framework. We develop the basic elements of the framework and give an example of its envisioned operation.

    References

    [1]
    }}Secerno available at http://www.secerno.com/, 2010.
    [2]
    }}Zabbix available at http://www.zabbix.org/, 2010.
    [3]
    }}M. Abadi, M. Budiu, Ú. Erlingsson, and J. Ligatti. Control-flow integrity. In CCS, pages 340--53, 2005.
    [4]
    }}D. Chapman. Cisco Secure PIX Firewalls. 2001.
    [5]
    }}M. Costa, M. Castro, L. Zhou, L. Zhang, and M. Peinado. Bouncer: securing software by blocking bad input. In SOSP, pages 117--30, 2007.
    [6]
    }}H. Feng, O. Kolesnikov, P. Fogla, W. Lee, and W. Gong. Anomaly detection using call stack information. In IEEE - S&P, page 62, 2003.
    [7]
    }}W. Hoeffding. Probability inequalities for sums of bounded random variables. JASA, 58(301):13--30, 1963.
    [8]
    }}Samuel T. King and Peter M. Chen. Backtracking intrusions. SIGOPS Oper. Syst. Rev.,3 7(5):223--36, 2003.
    [9]
    }}T. Kojm. Clamav: http://www.clamav.net/, 2009.
    [10]
    }}N. Nethercote and J. Seward. Valgrind: A program supervision framework. Elec. Notes in Theoretical Com. Sci., 89(2):44--66, 2003. RVWorkshop.
    [11]
    }}M. Roesch. Snort - lightweight intrusion detection for networks. In USENIX-LISA, pages 229--38, 1999.
    [12]
    }}B. Schneier. Attack trees. Dr. Dobb's Journal, 1999.
    [13]
    }}D. Song, D. Brumley, H. Yin, J. Caballero, I. Jager, M. Kang, Z. Liang, J. Newsome, P. Poosankam, and P. Saxena. BitBlaze: A new approach to computer security via binary analysis. In ICISS, 2008.
    [14]
    }}J. Tucek, J. Newsome, S. Lu, C. Huang, S. Xanthos, D. Brumley, Y. Zhou, and D. Song. Sweeper: A lightweight end-to-end system for defending against fastworms. SIGOPS Oper. Syst. Rev., 41(3):115--28, 2007.
    [15]
    }}B. Wotring, B. Potter, M. Ranum, and R. Wichmann. Host Integrity Monitoring Using Osiris and Samhain. Syngress Publishing, 2005.
    [16]
    }}S. A. Zonouz, H. Khurana, W. H. Sanders, and T. M. Yardley. RRE: A game-theoretic intrusion Response and Recovery Engine. In DSN, pages439--48, 2009.

    Cited By

    View all
    • (2020)Dynamical Propagation Model of Malware for Cloud Computing SecurityIEEE Access10.1109/ACCESS.2020.29689168(20325-20333)Online publication date: 2020
    • (2015)Empirical Development of a Trusted Sensing Base for Power System InfrastructuresIEEE Transactions on Smart Grid10.1109/TSG.2015.24353706:5(2454-2463)Online publication date: Sep-2015
    • (2015)Towards resilient cyber-physical control systems2015 IEEE Global Conference on Signal and Information Processing (GlobalSIP)10.1109/GlobalSIP.2015.7418279(662-666)Online publication date: Dec-2015
    • Show More Cited By

    Index Terms

    1. Cost-aware systemwide intrusion defense via online forensics and on-demand detector deployment

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        SafeConfig '10: Proceedings of the 3rd ACM workshop on Assurable and usable security configuration
        October 2010
        98 pages
        ISBN:9781450300933
        DOI:10.1145/1866898
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 04 October 2010

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tag

        1. intrusion detection and forensics systems

        Qualifiers

        • Short-paper

        Conference

        CCS '10
        Sponsor:

        Acceptance Rates

        Overall Acceptance Rate 22 of 61 submissions, 36%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)4
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 09 Aug 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2020)Dynamical Propagation Model of Malware for Cloud Computing SecurityIEEE Access10.1109/ACCESS.2020.29689168(20325-20333)Online publication date: 2020
        • (2015)Empirical Development of a Trusted Sensing Base for Power System InfrastructuresIEEE Transactions on Smart Grid10.1109/TSG.2015.24353706:5(2454-2463)Online publication date: Sep-2015
        • (2015)Towards resilient cyber-physical control systems2015 IEEE Global Conference on Signal and Information Processing (GlobalSIP)10.1109/GlobalSIP.2015.7418279(662-666)Online publication date: Dec-2015
        • (2013)TSB: Trusted sensing base for the power grid2013 IEEE International Conference on Smart Grid Communications (SmartGridComm)10.1109/SmartGridComm.2013.6688058(803-808)Online publication date: Oct-2013
        • (2012)SCPSE: Security-Oriented Cyber-Physical State Estimation for Power Grid Critical InfrastructuresIEEE Transactions on Smart Grid10.1109/TSG.2012.22177623:4(1790-1799)Online publication date: Dec-2012
        • (2011)FloguardProceedings of the 30th international conference on Computer safety, reliability, and security10.5555/2041619.2041653(338-354)Online publication date: 19-Sep-2011
        • (2011)A cloud-based intrusion detection and response system for mobile phonesProceedings of the 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops10.1109/DSNW.2011.5958860(31-32)Online publication date: 27-Jun-2011
        • (2011)FloGuard: Cost-Aware Systemwide Intrusion Defense via Online Forensics and On-Demand IDS DeploymentComputer Safety, Reliability, and Security10.1007/978-3-642-24270-0_25(338-354)Online publication date: 2011

        View Options

        Get Access

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media