• DocumentCode
    3018422
  • Title

    Formalizing sensitivity in static analysis for intrusion detection

  • Author

    Feng, Henry Hanping ; Giffin, Jonathon T. ; Huang, Yong ; Jha, Somesh ; Lee, Wenke ; Miller, Barton P.

  • Author_Institution
    Dept. of Electr. & Comput. Eng., Massachusetts-Amherst Univ., Amherst, MA, USA
  • fYear
    2004
  • fDate
    9-12 May 2004
  • Firstpage
    194
  • Lastpage
    208
  • Abstract
    A key function of a host-based intrusion detection system is to monitor program execution. Models constructed using static analysis have the highly desirable feature that they do not produce false alarms; however, they may still miss attacks. Prior work has shown a trade-off between efficiency and precision. In particular, the more accurate models based upon pushdown automata (PDA) are very inefficient to operate due to non-determinism in stack activity. In this paper, we present techniques for determinizing PDA models. We first provide a formal analysis framework of PDA models and introduce the concepts of determinism and stack-determinism. We then present the VP-Static model, which achieves determinism by extracting information about stack activity of the program, and the Dyck model, which achieves stack-determinism by transforming the program and inserting code to expose program state. Our results show that in run-time monitoring, our models slow execution of our test programs by 1% to 135%. This shows that reasonable efficiency needs not be sacrificed for model precision. We also compare the two models and discover that deterministic PDA are more efficient, although stack-deterministic PDA require less memory.
  • Keywords
    authorisation; formal specification; program diagnostics; pushdown automata; telecommunication security; Dyck model; VP-Static model; formal analysis; information extraction; intrusion detection; program execution monitoring; program testing; pushdown automata; run-time monitoring; stack-determinism; static analysis; Automata; Computerized monitoring; Data mining; Educational institutions; Intrusion detection; Operating systems; Personal digital assistants; Runtime; State-space methods; Testing;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Security and Privacy, 2004. Proceedings. 2004 IEEE Symposium on
  • ISSN
    1081-6011
  • Print_ISBN
    0-7695-2136-3
  • Type

    conf

  • DOI
    10.1109/SECPRI.2004.1301324
  • Filename
    1301324