Skip to main content

Detecting the Deviations of Privileged Process Execution

  • Conference paper
Book cover Networking - ICN 2005 (ICN 2005)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 3421))

Included in the following conference series:

Abstract

Most intruders access system unauthorizedly by exploiting vulnerabilities of privileged processes. Respectively monitoring privileged processes via system call sequences is one of effective methods to detect intrusions. Based on the analysis of popular attacks, we bring forward a new intrusion detection model monitoring the system call sequences, which use locally fuzzy matching to improve the detection accuracy. And the model adopts a novel profile generation method, which could easily generate better profile. The experimental results show that both the accuracy and the efficiency have been improved.

Supported by the National Grand Fundamental Research 973 Program of China under Grant No.G1999035802, the National Foundation of China for Distinguished Young Scholars under Grant No.60025205, the National Natural Science Foundation of China under Grant No.60273027 and the National High-Tech Research and Development Plan of China under Grant No.2003AA142150.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Thomas, E.: Attack class: Buffer overflows, Hello World (1999)

    Google Scholar 

  2. Klog: The Frame Pointer Overwrite. Phrack Magazine 55 (1999)

    Google Scholar 

  3. Anonymous: Runtime Process Infection. Phrack Magazine, 59 (2002)

    Google Scholar 

  4. Blexim: Basic Integer Overflows. Phrack Magazine 60 (2002)

    Google Scholar 

  5. Hofmeyr, S.A., Forrest, S., Somayaji, A.: Intrusion Detection using Sequences of System calls. Journal of Computer Security 6 (1998)

    Google Scholar 

  6. Okazaki, Y., Sato, I.: A New Intrusion Detection Method based on Process Profiling. In: Proceedings of the 2002 Symposium on Applications and the Internet, SAINT 2002 (2002)

    Google Scholar 

  7. Liao, L., Vemuri, V.R.: Use of Text Categorization Techniques for Intrusion Detection. In: Proceedings of the 11th USENIX Security Symposium (2002)

    Google Scholar 

  8. Eskin, E., Lee, W., Stolfo, S.J.: Modeling System Calls for Intrusion Detection with Dynamic Window Sizes. In: Proceedings of DISCEXII (June 2001)

    Google Scholar 

  9. Warrender, C., Forrest, S., Pearlmutter, B.: Detecting intrusions using system calls: Alternative data models. In: Proceedings IEEE Symposium on Security and Privacy, pp. 133–145 (1999)

    Google Scholar 

  10. Sekar, R., Bendre, M., Dhurjati, D., Bollineni, P.: A Fast Automation-Based Method for Detecting Anomalous Program Behaviors. In: IEEE Symposium on Security and Privacy (2001)

    Google Scholar 

  11. Tinnagonsutibout, C., Watanapongse, P.: A Novel Approach to Process-based Intrusion Detection System Using Read-sequence Finite State Automata with Inbound Byte Profiler. In: ICEP 2003 (January 2003)

    Google Scholar 

  12. Ko, C.: Logic Induction of Valid Behavior Specifications for Intrusion Detection. In: IEEE Symposium on Security and Privacy, Berkeley, California (2000)

    Google Scholar 

  13. Wepsi, A., Dacier, M., Debar, H.: Intrusion Detection Using Variable-Length Audit Trail Patterns. In: Debar, H., Mé, L., Wu, S.F. (eds.) RAID 2000. LNCS, vol. 1907, pp. 110–129. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  14. Wagner, D., Dean, D.: Intrusion Detection via Static Analysis. In: IEEE Symposium on Security and Privacy, Oakland, CA (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Su, P., Li, D., Qu, H., Feng, D. (2005). Detecting the Deviations of Privileged Process Execution. In: Lorenz, P., Dini, P. (eds) Networking - ICN 2005. ICN 2005. Lecture Notes in Computer Science, vol 3421. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31957-3_111

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-31957-3_111

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25338-9

  • Online ISBN: 978-3-540-31957-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics