Building an Application Data Behavior Model for Intrusion Detection

被引:0
|
作者
Sarrouy, Olivier [1 ]
Totel, Eric [1 ]
Jouga, Bernard [1 ]
机构
[1] Supelec, F-35576 Cesson Sevigne, France
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Application level intrusion detection systems usually rely oil the immunological approach. In this approach, the application behavior is compared at runtime with a previously learned application profile of the sequence of system calls it is allowed to emit. Unfortunately, this approach cannot detect anything but control flow violation and thus remains helpless in detecting the attacks that aim pure application data. In this paper, we propose an approach that would enhance the detection of such attacks. Our proposal relies on a data oriented behavioral model that builds the application profile out of dynamically extracted invariant constraints oil the application data items.
引用
收藏
页码:299 / 306
页数:8
相关论文
共 50 条
  • [1] Inferring a Distributed Application Behavior Model for Anomaly Based Intrusion Detection
    Totel, Eric
    Hkimi, Mouna
    Hurfin, Michel
    Leslous, Mourad
    Labiche, Yvan
    2016 12TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2016), 2016, : 53 - 64
  • [2] Application of Data Mining to Network Intrusion Detection: Classifier Selection Model
    Nguyen, Huy Anh
    Choi, Deokjai
    CHALLENGES FOR NEXT GENERATION NETWORK OPERATIONS AND SERVICE MANAGEMENT, PROCEEDINGS, 2008, 5297 : 399 - 408
  • [3] Application of deep learning model in computer data mining intrusion detection
    Chen, Yan
    Zhao, Cuirong
    APPLIED MATHEMATICS AND NONLINEAR SCIENCES, 2023,
  • [4] Application of Cloud Model in Intrusion Detection
    Wang, Deguang
    Zhou, Zhigang
    2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 164 - 167
  • [5] Data mining framework for building intrusion detection models
    Columbia Univ, New York, United States
    Proc IEEE Comput Soc Symp Res Secur Privacy, (120-132):
  • [6] A data mining framework for building intrusion detection models
    Lee, W
    Stolfo, SJ
    Mok, KW
    PROCEEDINGS OF THE 1999 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 1999, : 120 - 132
  • [7] Data mining framework for building intrusion detection models
    Lee, Wenke
    Stolfo, Salvatore J.
    Mok, Kui W.
    Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, : 120 - 132
  • [8] Monitoring database application behavior for intrusion detection
    Fonseca, Jose
    Vieira, Marco
    Madeira, Henrique
    12TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 2006, : 383 - +
  • [9] Application of PSVM and data processing for intrusion detection
    Xiao, Haijun
    Hong, Fan
    Zhang, Zhaoli
    Liao, Junguo
    DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2007, 14 : 627 - 633
  • [10] Application of Data Mining Techniques in Intrusion Detection
    Li Min
    CALL OF PAPER PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING, 2008, : 1273 - 1277