skip to main content
10.1145/2976749.2976750acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
tutorial
Public Access

Program Anomaly Detection: Methodology and Practices

Published:24 October 2016Publication History

ABSTRACT

This tutorial will present an overview of program anomaly detection, which analyzes normal program behaviors and discovers aberrant executions caused by attacks, misconfigurations, program bugs, and unusual usage patterns. It was first introduced as an analogy between intrusion detection for programs and the immune mechanism in biology. Advanced models have been developed in the last decade and comprehensive techniques have been adopted such as hidden Markov model and machine learning. We will introduce the audience to the problem of program attacks and the anomaly detection approach against threats. We will give a general definition for program anomaly detection and derive model abstractions from the definition. The audience will be walked through the development of program anomaly detection methods from early-age n-gram approaches to complicated pushdown automata and probabilistic models. Some lab tools will be provided to help understand primitive detection models. This procedure will help the audience understand the objectives and challenges in designing program anomaly detection models. We will discuss the attacks that subvert anomaly detection mechanisms. The field map of program anomaly detection will be presented. We will also briefly discuss the applications of program anomaly detection in Internet of Things security. We expect the audience to get an idea of unsolved challenges in the field and develop a sense of future program anomaly detection directions after attending the tutorial.

References

  1. D. E. Denning. An intrusion-detection model. IEEE Transactions on Software Engineering, 13(2):222--232, 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff. A sense of self for Unix processes. In Proceedings of the IEEE Symposium on Security and Privacy, pages 120--128. IEEE Computer Society, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. D. Gao, M. K. Reiter, and D. Song. Behavioral distance measurement using hidden Markov models. In Proceedings of the International Symposium on Research in Attacks, Intrusions and Defenses, pages 19--40. Springer, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. H. Hu, S. Shinde, S. Adrian, Z. L. Chua, P. Saxena, and Z. Liang. Data-oriented programming: On the expressiveness of non-control data attacks. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE Computer Society, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  5. A. P. Kosoresow and S. A. Hofmeyr. Intrusion detection via system call traces. IEEE software, 14(5):35--42, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. W. Lee and S. J. Stolfo. Data mining approaches for intrusion detection. In Proceedings of the USENIX Security Symposium, pages 6--6. USENIX Association, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. R. Sekar, M. Bendre, D. Dhurjati, and P. Bollineni. A fast automaton-based method for detecting anomalous program behaviors. In Proceedings of the IEEE Symposium on Security and Privacy, pages 144--155. IEEE Computer Society, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. X. Shu, D. Yao, and N. Ramakrishnan. Unearthing stealthy program attacks buried in extremely long execution paths. In Proceedings of the 2015 ACM Conference on Computer and Communications Security (CCS), pages 401--413. ACM, October 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. X. Shu, D. Yao, and B. G. Ryder. A formal framework for program anomaly detection. In Proceedings of the 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), pages 270--292. Springer, November 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. D. Wagner and R. Dean. Intrusion detection via static analysis. In Proceedings of the IEEE Symposium on Security and Privacy, pages 156--168. IEEE Computer Society, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. C. Warrender, S. Forrest, and B. Pearlmutter. Detecting intrusions using system calls: Alternative data models. In Proceedings of the IEEE Symposium on Security and Privacy, pages 133--145. IEEE Computer Society, 1999.Google ScholarGoogle ScholarCross RefCross Ref
  12. K. Xu, K. Tian, D. Yao, and B. G. Ryder. A sharper sense of self: Probabilistic reasoning of program behaviors for anomaly detection with context sensitivity. In Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, May 2016.Google ScholarGoogle ScholarCross RefCross Ref
  13. K. Xu, D. D. Yao, B. G. Ryder, and K. Tian. Probabilistic program modeling for high-precision anomaly classification. In Proceedings of the IEEE 28th Computer Security Foundations Symposium, pages 497--511. IEEE, July 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Program Anomaly Detection: Methodology and Practices

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
      October 2016
      1924 pages
      ISBN:9781450341394
      DOI:10.1145/2976749

      Copyright © 2016 Owner/Author

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 24 October 2016

      Check for updates

      Qualifiers

      • tutorial

      Acceptance Rates

      CCS '16 Paper Acceptance Rate137of831submissions,16%Overall Acceptance Rate1,261of6,999submissions,18%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader