2009
DOI: 10.1007/978-3-642-03007-9_21
|View full text |Cite
|
Sign up to set email alerts
|

Building an Application Data Behavior Model for Intrusion Detection

Abstract: Abstract. Application level intrusion detection systems usually rely on the immunological approach. In this approach, the application behavior is compared at runtime with a previously learned application profile of the sequence of system calls it is allowed to emit. Unfortunately, this approach cannot detect anything but control flow violation and thus remains helpless in detecting the attacks that aim pure application data. In this paper, we propose an approach that would enhance the detection of such attacks… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 14 publications
(13 reference statements)
0
2
0
Order By: Relevance
“…Current researches in the field of app‐IDS leverage system level models of the initial application, such that the modifications can be detected by the IDS. These models are mostly based on application system‐calls [11], events [12], control‐flow [13], or data‐flow [14, 15]. The models have evolved from naive sequences [16] in primary researches to more accurate models by use of complex techniques such as extreme learning machine [17].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Current researches in the field of app‐IDS leverage system level models of the initial application, such that the modifications can be detected by the IDS. These models are mostly based on application system‐calls [11], events [12], control‐flow [13], or data‐flow [14, 15]. The models have evolved from naive sequences [16] in primary researches to more accurate models by use of complex techniques such as extreme learning machine [17].…”
Section: Introductionmentioning
confidence: 99%
“…On the one hand, the main shortcoming of existing methods is that they need to leverage dynamic application monitoring facilities inside the operating system (OS), use system/application instrumentation [13, 18] or alternatively use virtualisation [15, 19, 20] in order to obtain their required application traces. In other words, they need to trust the system software, which results in a large and complex trusted computing base (TCB).…”
Section: Introductionmentioning
confidence: 99%