Title of article :
Generating profile-based signatures for online intrusion and failure detection
Author/Authors :
Masri، نويسنده , , Wes and Abou Assi، نويسنده , , Rawad and El-Ghali، نويسنده , , Marwa، نويسنده ,
Issue Information :
ماهنامه با شماره پیاپی سال 2014
Pages :
14
From page :
238
To page :
251
Abstract :
AbstractContext m execution profiles have been extensively and successfully used in several dynamic analysis fields such as software testing and fault localization. ive aper presents a pattern-matching approach implemented as an application-based intrusion (and failure) detection system that operates on signatures generated from execution profiles. Such signatures are not descriptions of exploits, i.e. they do not depend on the syntax or semantics of the exploits, but instead are descriptions of program events that correlate with the exploitation of program vulnerabilities. erability exploit is generally correlated with the execution of a combination of program elements, such as statements, branches, and definition–use pairs. In this work we first analyze the execution profiles of a vulnerable application in order to identify such suspicious combinations, define signatures that describe them, and consequently deploy these signatures within an intrusion detection system that performs online signature matching. s luate our approach, which is also applicable to online failure detection, we implemented it for the Java platform and applied it onto seven open-source applications containing 30 vulnerabilities/defects for the purpose of the online detection of attacks/ failures. Our results showed that our approach worked very well for 26 vulnerabilities/defects (86.67%) and the overhead imposed by the system is somewhat acceptable as it varied from 46% to 102%. The exhibited average rates of false negatives and false positives were 0.43% and 1.03%, respectively. sion profile-based signatures for online intrusion and failure detection was shown to be effective.
Keywords :
Application-based intrusion detection , Profile-based signatures , Vulnerability-based signatures , Online failure detection , Combinations of program elements , genetic algorithm
Journal title :
Information and Software Technology
Serial Year :
2014
Journal title :
Information and Software Technology
Record number :
2375204
Link To Document :
بازگشت