Proceedings of the 11th ACM Conference on Computer and Communications Security 2004
DOI: 10.1145/1030083.1030126
|View full text |Cite
|
Sign up to set email alerts
|

Gray-box extraction of execution graphs for anomaly detection

Abstract: Many host-based anomaly detection systems monitor a process by observing the system calls it makes, and comparing these calls to a model of behavior for the program that the process should be executing. In this paper we introduce a new model of system call behavior, called an execution graph. The execution graph is the first such model that both requires no static analysis of the program source or binary, and conforms to the control flow graph of the program. When used as the model in an anomaly detection syst… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
75
0

Year Published

2005
2005
2019
2019

Publication Types

Select...
7

Relationship

2
5

Authors

Journals

citations
Cited by 93 publications
(75 citation statements)
references
References 14 publications
0
75
0
Order By: Relevance
“…Our return value sniffer is available under the GNU GPL at our website 5 . We show that using a window of return values, including values returned by sibling and parent functions, can make return value prediction as accurate as 97%.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Our return value sniffer is available under the GNU GPL at our website 5 . We show that using a window of return values, including values returned by sibling and parent functions, can make return value prediction as accurate as 97%.…”
Section: Resultsmentioning
confidence: 99%
“…A popular approach to observing program behavior utilizes anomaly detection on a profile derived from system call sequences [1][2][3][4][5]. Relatively little attention has been paid to the question of building profiles -in a non-invasive fashion -at a level of detail that includes the application's internal behavior.…”
Section: Observing Program Behaviormentioning
confidence: 99%
See 1 more Smart Citation
“…Such intrusion detection systems are efficient in detecting classical attacks which obviously modify the sequences of system calls emitted by the application, but are easy to evade by mimicing the sequence of system calls the application is supposed to emit [20]. To contend this kind of attacks, proposals have been done to enhance the behavioral model with process internal information, such as the content of the call stack or the value of the program counter at the time of system calls [12]. Such approaches, called gray-box approaches, indeed make mimicry attacks more difficult to succeed but remain unable to detect anything but control flow integrity violation.…”
Section: Introductionmentioning
confidence: 99%
“…Intrusion detection systems (IDS) are the most popular type of anomaly detectors (there are countless references). But also operating systems are a prominent target for anomaly detectors (cf eg [2], [4] and [8]). …”
Section: Introductionmentioning
confidence: 99%