Title :
Efficient intrusion detection using automaton inlining
Author :
Gopalakrishna, Rajeev ; Spafford, Eugene H. ; Vitek, Jan
Author_Institution :
Dept. of Comput. Sci., Purdue Univ., West Lafayette, IN, USA
Abstract :
Host-based intrusion detection systems attempt to identify attacks by discovering program behaviors that deviate from expected patterns. While the idea of performing behavior validation on-the-fly and terminating errant tasks as soon as a violation is detected is appealing, existing systems exhibit serious shortcomings in terms of accuracy and/or efficiency. To gain acceptance, a number of technical advances are needed. In this paper we focus on automated, conservative, intrusion detection techniques, i.e. techniques which do not require human intervention and do not suffer from false positives. We present a static analysis algorithm for constructing a flow- and context-sensitive model of a program that allows for efficient online validation. Context-sensitivity is essential to reduce the number of impossible control-flow paths accepted by the intrusion detection system because such paths provide opportunities for attackers to evade detection. An important consideration for on-the-fly intrusion detection is to reduce the performance overhead caused by monitoring. Compared to the existing approaches, our inlined automaton model (IAM) presents a good tradeoff between accuracy and performance. On a 32K line program, the monitoring overhead is negligible. While the space requirements of a naive IAM implementation can be quite high, compaction techniques can be employed to substantially reduce that footprint.
Keywords :
automata theory; computer network management; monitoring; security of data; IAM; attacks; automated conservative intrusion detection; automaton inlining; compaction techniques; context-sensitive model; flow-sensitive model; host-based intrusion detection; inlined automaton model; monitoring overhead; on-the-fly intrusion detection; online validation; reduced footprint; static analysis algorithm; Algorithm design and analysis; Automata; Computer science education; Computer security; Context modeling; Educational programs; Humans; Information security; Intrusion detection; Monitoring;
Conference_Titel :
Security and Privacy, 2005 IEEE Symposium on
Print_ISBN :
0-7695-2339-0