DocumentCode :
175518
Title :
Total ADS: Automated Software Anomaly Detection System
Author :
Murtaza, Syed Shariyar ; Hamou-Lhadj, Abdelwahab ; Khreich, Wael ; Couture, Mario
Author_Institution :
Software Behaviour Anal. Res. Lab., Concordia Univ., Montreal, QC, Canada
fYear :
2014
fDate :
28-29 Sept. 2014
Firstpage :
83
Lastpage :
88
Abstract :
When a software system starts behaving abnormally during normal operations, system administrators resort to the use of logs, execution traces, and system scanners (e.g., anti-malwares, intrusion detectors, etc.) to diagnose the cause of the anomaly. However, the unpredictable context in which the system runs and daily emergence of new software threats makes it extremely challenging to diagnose anomalies using current tools. Host-based anomaly detection techniques can facilitate the diagnosis of unknown anomalies but there is no common platform with the implementation of such techniques. In this paper, we propose an automated anomaly detection framework (Total ADS) that automatically trains different anomaly detection techniques on a normal trace stream from a software system, raise anomalous alarms on suspicious behaviour in streams of trace data, and uses visualization to facilitate the analysis of the cause of the anomalies. Total ADS is an extensible Eclipse-based open source framework that employs a common trace format to use different types of traces, a common interface to adapt to a variety of anomaly detection techniques (e.g., HMM, sequence matching, etc.). Our case study on a modern Linux server shows that Total ADS automatically detects attacks on the server, shows anomalous paths in traces, and provides forensic insights.
Keywords :
digital forensics; public domain software; software fault tolerance; software maintenance; TotalADS; automated anomaly detection framework; automated software anomaly detection system; daily emergence; execution traces; extensible Eclipse-based open source framework; forensic insights; host-based anomaly detection; modern Linux server; normal trace stream; software system; software threats; system administrators resort; system scanners; Engines; Hidden Markov models; Kernel; Linux; Servers; Testing; Training; Anomaly Detection; Software Security; Trace Analysis;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Source Code Analysis and Manipulation (SCAM), 2014 IEEE 14th International Working Conference on
Conference_Location :
Victoria, BC
Type :
conf
DOI :
10.1109/SCAM.2014.37
Filename :
6975641
Link To Document :
بازگشت