Long-Span Program Behavior Modeling and Attack Detection

被引:19
|
作者
Shu, Xiaokui [1 ]
Yao, Danfeng [2 ]
Ramakrishnan, Naren [3 ]
Jaeger, Trent [4 ]
机构
[1] IBM Res, 1101 Kitchawan Rd, Yorktown Hts, NY 10598 USA
[2] Virginia Tech, 2202 Kraft Dr, Blacksburg, VA 24060 USA
[3] Virginia Tech, VTRC Arlington, Room 5-026,900 North Glebe Rd, Arlington, VA 22203 USA
[4] Penn State Univ, 346A IST Bldg, University Pk, PA 16802 USA
关键词
Intrusion detection; program analysis; anomaly detection; context-sensitive grammar; co-occurrence analysis; event frequency correlation; machine learning; INTRUSION-DETECTION; SYSTEM;
D O I
10.1145/3105761
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intertwined developments between program attacks and defenses witness the evolution of program anomaly detection methods. Emerging categories of program attacks, e.g., non-control data attacks and data-oriented programming, are able to comply with normal trace patterns at local views. This article points out the deficiency of existing program anomaly detection models against new attacks and presents long-span behavior anomaly detection (LAD), a model based on mildly context-sensitive grammar verification. The key feature of LAD is its reasoning of correlations among arbitrary events that occurred in long program traces. It extends existing correlation analysis between events at a stack snapshot, e.g., paired call and ret, to correlation analysis among events that historically occurred during the execution. The proposed method leverages specialized machine learning techniques to probe normal program behavior boundaries in vast high-dimensional detection space. Its two-stage modeling/detection design analyzes event correlation at both binary and quantitative levels. Our prototype successfully detects all reproduced real-world attacks against sshd, libpcre, and sendmail. The detection procedure incurs 0.1 ms to 1.3 ms overhead to profile and analyze a single behavior instance that consists of tens of thousands of function call or system call events.
引用
收藏
页数:28
相关论文
共 50 条
  • [1] LONG-SPAN BRIDGE COMPUTER MODELING
    FISHER, TA
    RAO, RBK
    [J]. JOURNAL OF STRUCTURAL ENGINEERING-ASCE, 1983, 109 (06): : 1402 - 1413
  • [2] BEHAVIOR AND DESIGN OF LONG-SPAN METAL CULVERTS
    DUNCAN, JM
    [J]. JOURNAL OF THE GEOTECHNICAL ENGINEERING DIVISION-ASCE, 1979, 105 (03): : 399 - 418
  • [4] Ultimate behavior of long-span steel arch bridges
    Cheng, J
    Jiang, JJ
    Xiao, RC
    Xiang, HF
    [J]. STRUCTURAL ENGINEERING AND MECHANICS, 2002, 14 (03) : 331 - 343
  • [5] RESEARCH ON MODELING AND OPTIMIZATION PROGRAM OF LONG-SPAN HYBRID GRID HANGAR BASED ON LEVERAGE PRINCIPLE
    Zhang, Wenbo
    Wang, Deyou
    Shi, Guangshun
    [J]. CIVIL ENGINEERING JOURNAL-STAVEBNI OBZOR, 2021, 30 (01): : 162 - 174
  • [6] LONG-SPAN BRIDGE
    KULKA, F
    [J]. CIVIL ENGINEERING, 1972, 42 (08): : 59 - &
  • [7] LONG-SPAN LONGEVITY
    不详
    [J]. ENGINEERING NEWS-RECORD, 1983, 210 (20): : 84 - 84
  • [8] Modeling and modal analysis of the structure of long-span transmission tower
    Li, Kai
    Zhu, Rui
    Wang, Zhenguo
    Zhou, Xiaoyu
    Wang, Mingxin
    Xu, Siyu
    Gong, Yicheng
    [J]. JOURNAL OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING, 2023, 23 (03) : 1491 - 1501
  • [9] STATICAL BEHAVIOR OF LONG-SPAN CABLE-STAYED BRIDGES
    COMO, M
    GRIMALDI, A
    MACERI, F
    [J]. INTERNATIONAL JOURNAL OF SOLIDS AND STRUCTURES, 1985, 21 (08) : 831 - 850
  • [10] Damage Detection for Long-Span Cable-Stayed Bridge
    赵玲
    李爱群
    缪长青
    汪永兰
    [J]. Railway Engineering Science, 2006, (01) : 63 - 72