DocumentCode
2105014
Title
Using extended information to refine program behavior profile
Author
Feng Xie ; Yong Peng ; Dongqing Chen
Author_Institution
China Inf. Technol., Security Evaluation Center, Beijing, China
fYear
2012
fDate
9-11 Nov. 2012
Firstpage
991
Lastpage
995
Abstract
System call provides the interface between an application and operating system, which is wildly used to detect network intrusions. By the extraction of extended information from system call stack, a new audit event is constructed and is used to refine the program profile in this paper. We name it as l-call. Meanwhile a Chebyshev´s inequality based approach is also proposed to measure the anomaly degree which reflects the degree of deviation from the normal behavior due to the intrusions. Compared with system call, l-call has much more granularity to better describe the program behavior. Although the number of l-call is greater than that of system call which will inevitably lead to greater storage overhead, many experiments show that these costs are at an acceptable level, and l-call-based model has acquired more detection performance than system-call-based model.
Keywords
computer network security; data flow analysis; operating systems (computers); Chebyshev inequality based approach; detect network intrusions; extended information; l-call-based model; operating system; program behavior profile refinement; program profile; system call stack; system-call-based model; Chebyshev´s inequality; anomaly degree; extended information; l-call;
fLanguage
English
Publisher
ieee
Conference_Titel
Communication Technology (ICCT), 2012 IEEE 14th International Conference on
Conference_Location
Chengdu
Print_ISBN
978-1-4673-2100-6
Type
conf
DOI
10.1109/ICCT.2012.6511343
Filename
6511343
Link To Document