• DocumentCode
    2564476
  • Title

    An Efficient Technique for Preventing Mimicry and Impossible Paths Execution Attacks

  • Author

    Bruschi, Danilo ; Cavallaro, Lorenzo ; Lanzi, Andrea

  • Author_Institution
    Dipt. di Informatica e Comunicazione, Univ. degli Studi di Milano, Milan
  • fYear
    2007
  • fDate
    11-13 April 2007
  • Firstpage
    418
  • Lastpage
    425
  • Abstract
    In this paper we propose a new strategy for dealing with the impossible path execution (IPE) and the mimicry attack in the N-gram based HIDS model. Our strategy is based on a kernel-level module which interacts with an underlying HIDS and whose main scope is to "randomize" sequences of system calls produced by an application to make them unpredictable by any attacker. We implemented a prototype of such a module on a Linux system in order to experimentally verify the feasibility and efficacy of our idea. The results obtained are quite encouraging, furthermore it turned out that our module is quite efficient, as it affected the performance of a testbed Web server with a slowdown factor of only 5.9%.
  • Keywords
    Internet; Linux; security of data; telecommunication security; HIDS; Linux system; Web server; host intrusion detection system; impossible paths execution attack prevention; mimicry prevention; slowdown factor; Counting circuits; Flow graphs; Information filtering; Information filters; Intrusion detection; Linux; Monitoring; Prototypes; Testing; Web server;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Performance, Computing, and Communications Conference, 2007. IPCCC 2007. IEEE Internationa
  • Conference_Location
    New Orleans, LA
  • ISSN
    1097-2641
  • Print_ISBN
    1-4244-1138-6
  • Electronic_ISBN
    1097-2641
  • Type

    conf

  • DOI
    10.1109/PCCC.2007.358922
  • Filename
    4197958