skip to main content
10.1145/1712605.1712623acmconferencesArticle/Chapter ViewAbstractPublication PagesicpeConference Proceedingsconference-collections
research-article

Monitoring for security intrusion using performance signatures

Published:28 January 2010Publication History

ABSTRACT

A new approach for detecting security attacks on software systems by monitoring the software system performance signatures is introduced. We present a proposed architecture for security intrusion detection using off-the-shelf security monitoring tools and performance signatures. Our approach relies on the assumption that the performance signature of the well-behaved system can be measured and that the performance signature of several types of attacks can be identified. This assumption has been validated for operations support systems that are used to monitor large infrastructures and receive aggregated traffic that is periodic in nature. Examples of such infrastructures include telecommunications systems, transportation systems and power generation systems. In addition, significant deviation from well-behaved system performance signatures can be used to trigger alerts about new types of security attacks. We used a custom performance benchmark and five types of security attacks to derive performance signatures for the normal mode of operation and the security attack mode of operation. We observed that one of the types of the security attacks went undetected by the off-the-shelf security monitoring tools but was detected by our approach of monitoring performance signatures. We conclude that an architecture for security intrusion detection can be effectively complemented by monitoring of performance signatures.

References

  1. A. Avritzer and E.J. Weyuker. The Automatic Generation of Load Test Suites and the Assessment of the Resulting Software. IEEE Trans. on Software Engineering, Sept 1995, pp. 705--716. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. A. Avritzer and E.J. Weyuker, Detecting failed processes using fault signatures, International Computer Performance and Dependability Symposium, July, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. A. Avritzer and E.J. Weyuker, Monitoring Smoothly Degrading Systems for Increased Dependability, Empirical Software Engineering, Springer Netherlands, March 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. A. Avritzer, J.P. Ros and E.J. Weyuker, Estimating the CPU utilization of a rule-based system, Proc. Fourth International Workshop on Software and Performance 2004, Redwood Shores, California, Jan, 2004, pp. 1--12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. A. Avritzer, A. Bondi and E.J. Weyuker, Ensuring Stable Performance for Systems that Degrade, Proc. Fifth International Workshop on Software and Performance 2005, Palma de Mallorca, Spain, July, 2005, pp. 43--51. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. A. Avritzer, R.G. Cole and E.J. Weyuker, Using performance signatures and software rejuvenation for worm mitigation in tactical MANETs, Proc. Sixth International Workshop on Software and Performance 2007, Buenos Aires, Argentina, February, 2007, pp. 172--180. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. W. Diffie and M.E. Hellman, New directions in cryptography. IEEE Transactions on Information Theory, vol IT-22, Nov 1976, pp:644--654.Google ScholarGoogle Scholar
  8. S.A. Hofmeyr and S. Forrest and A. Somayaji, Intrusion Detection Using Sequences of System Calls. Journal of Computer Security, vol 6, No 3, 1998, pp 151--180. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Y. Huang, C. Kintala, N. Kolettis, and N.D. Fulton, Software rejuvenation:Analysis, module and applications. Proc. Twenty-fifth International Symp. on Fault-Tolerant Computing, 1995, pp. 381--390. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. IBM Cryptography Research Group. http://domino.research.ibm.com/securityGoogle ScholarGoogle Scholar
  11. D. Khan. The code breakers. Macmillan, 1967.Google ScholarGoogle Scholar
  12. R. Mariani. Performance Signature: A qualitative approach to dependence guidance. International Computer Measurement Group Conference, pp 469--474, 2006.Google ScholarGoogle Scholar
  13. D.L .Oppenheimer and M.R. Martonosi, Performance Signatures: A Mechanism for Intrusion Detection. Proceedings of the 1997 IEEE Information Survivability Workshop, 1997. http://www.sysnet.ucsd.edu/ davidopp/pubs/perfsig.html.Google ScholarGoogle Scholar
  14. R.L. Rivest, A. Shamir and L. Adleman. A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM, Feb. 1978, pp 120--126. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. http://www.wired.com/threatlevel/2009/01/professedtwitt/Google ScholarGoogle Scholar
  16. Snort http://www.snort.org/Google ScholarGoogle Scholar
  17. Cain & Abel http://www.oxid.it/cain.htmlGoogle ScholarGoogle Scholar
  18. Wireshark http://www.wireshark.org/Google ScholarGoogle Scholar
  19. Hyperic Sigar http://www.hyperic.com/products/sigar.htmlGoogle ScholarGoogle Scholar
  20. DoSHttp http://www.socketsoft.net/Google ScholarGoogle Scholar
  21. Base http://base.secureideas.net/Google ScholarGoogle Scholar
  22. CurrPorts http://www.nirsoft.net/utils/cports.htmlGoogle ScholarGoogle Scholar
  23. SysTracer http://www.blueproject.ro/systracerGoogle ScholarGoogle Scholar

Index Terms

  1. Monitoring for security intrusion using performance signatures

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          WOSP/SIPEW '10: Proceedings of the first joint WOSP/SIPEW international conference on Performance engineering
          January 2010
          294 pages
          ISBN:9781605585635
          DOI:10.1145/1712605

          Copyright © 2010 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 28 January 2010

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate149of241submissions,62%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader