Title :
Secured networking by sandboxing LINUX 2.6
Author :
Mohanty, Hrushikesha ; Swamy, M.V. ; Thilak, P. ; Ramaswamy, Srini
Author_Institution :
Dept. of Comput. & Inf. Sci., Univ. of Hyderabad, Hyderabad, India
Abstract :
From system security point of view, system calls are vulnerable as they operate in kernel space. Hence monitoring of system call patterns performed by an application has been extensively studied for the development of intrusion detection systems (IDS), which have to respond immediately to abnormal behaviors. However these IDSs have limitations in detecting new types of attacks. Policy driven IDSs have the ability to detect novel attacks based on policies written for system activities. In this paper we propose a hybrid architecture for IDSs, that combines the features of both policy driven IDS and system call based IDS and the idea is experimented for sandboxing Linux 2.6.
Keywords :
Linux; security of data; IDS; intrusion detection systems; kernel space; sandboxing LINUX 2.6; system call pattern monitoring; system security; Computer networks; Computer science; Computer security; Cybernetics; Intrusion detection; Kernel; Linux; Monitoring; Pattern matching; USA Councils; Intrusion; Linux Kernel; Sandboxing;
Conference_Titel :
Systems, Man and Cybernetics, 2009. SMC 2009. IEEE International Conference on
Conference_Location :
San Antonio, TX
Print_ISBN :
978-1-4244-2793-2
Electronic_ISBN :
1062-922X
DOI :
10.1109/ICSMC.2009.5346871