Title :
An Algebra for the Detection and Prediction of Malicious Activity in Concurrent Systems
Author :
McEvoy, Thomas Richard ; Wolthusen, Stephen D.
Author_Institution :
Dept. of Math., Univ. of London, Egham, UK
Abstract :
The specification, verification, and validation of concurrent systems pose a number of challenges that are increasingly commonplace as multi-core and multi-processor systems are becoming ubiquitous. Any such system, particularly when actively exploiting concurrency, will experience variations up to non-determinism in some aspects of its behavior such as when awaiting I/O events or interacting with operation scheduling. We argue that this also makes it easier for adversaries - including both external exploits, logic bombs, or Trojan horses - to evade detection using conventional intrusion detection and prevention mechanisms. Novel attacks and subversion attempts cannot be reliably captured using specification-based approaches, whilst statistical and machine learning approaches are hampered by the inability to establish a clear baseline under the conditions described above. Therefore, we describe an algebra useful for specifying and identifying undesirable changes in state as linearizations of concurrent processes when supported by the ability to generate concurrent cross-view and cross-sectional observations of invariant behavior at semantically significant loci. This potential is enabled by the underlying concurrency assumption and the observation that malicious activity leading to subversion is generally non-atomic. The algebraic model is instantiated for the case of a multiprocessor host operating system and a sample subsystem.
Keywords :
algebraic specification; concurrency control; multiprocessing systems; program verification; security of data; I/O event; Trojan horses; algebraic model; algebraic specification; concurrent system; intrusion detection; logic bomb; malicious activity detection; malicious activity prediction; multicore system; multiprocessor host operating system; multiprocessor system; operation scheduling; prevention mechanism; system specification; system validation; system verification; Algebra; Computer science; Concurrent computing; Data structures; Educational institutions; Logic; Mathematics; Multiprocessing systems; Pervasive computing; Security; Concurrent systems; algebraic model; causality; multiprocessing;
Conference_Titel :
Systems (ICONS), 2010 Fifth International Conference on
Conference_Location :
Menuires
Print_ISBN :
978-1-4244-6231-5
DOI :
10.1109/ICONS.2010.29