Building an Application Data Behavior Model for Intrusion Detection

被引:0
|
作者
Sarrouy, Olivier [1 ]
Totel, Eric [1 ]
Jouga, Bernard [1 ]
机构
[1] Supelec, F-35576 Cesson Sevigne, France
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Application level intrusion detection systems usually rely oil the immunological approach. In this approach, the application behavior is compared at runtime with a previously learned application profile of the sequence of system calls it is allowed to emit. Unfortunately, this approach cannot detect anything but control flow violation and thus remains helpless in detecting the attacks that aim pure application data. In this paper, we propose an approach that would enhance the detection of such attacks. Our proposal relies on a data oriented behavioral model that builds the application profile out of dynamically extracted invariant constraints oil the application data items.
引用
收藏
页码:299 / 306
页数:8
相关论文
共 50 条
  • [21] Application of Unbalanced Data Approach to Network Intrusion Detection
    Zhao, Yueai
    Chen, Junjie
    FIRST INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, : 140 - +
  • [22] The Application of Data Mining Technology in the Intrusion Detection System
    Jia, Zongpu
    Jin, Shichao
    THIRD INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2010), 2010, : 208 - 211
  • [23] Application of Data Mining on the Design of Intrusion Detection System
    Chang Zhen-yun
    Du Yan-fang
    2011 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS AND CONTROL (ICECC), 2011, : 1890 - 1893
  • [24] Application of data mining technology to intrusion detection system
    Xia, HX
    Qi, S
    Rui, H
    DCABES 2004, Proceedings, Vols, 1 and 2, 2004, : 1027 - 1030
  • [25] Application of Gray Theory and Data Fusion in Intrusion Detection
    Xu Da-wei
    Liu Yi-an
    Wei Min
    2010 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING (MSE 2010), VOL 4, 2010, : 131 - 135
  • [26] Research on the Application of the Data Mining in Network Intrusion Detection
    Shen, Wei
    2014 2ND INTERNATIONAL CONFERENCE ON ECONOMIC, BUSINESS MANAGEMENT AND EDUCATION INNOVATION (EBMEI 2014), VOL 38, 2014, 38 : 234 - 237
  • [27] An intrusion detection model based on data mining over data
    Mao, Yi-Min
    Yang, Lu-Ming
    Chen, Zhi-Gang
    Liu, Li-Xin
    Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and Technology), 2011, 42 (09): : 2720 - 2728
  • [28] Building a Network Intrusion Model Based on Data from Honeypots
    Shkirdov, Danila A.
    Sagatov, Evgeny S.
    Sukhov, Andrei M.
    Zuev, Sergey A.
    2018 26TH TELECOMMUNICATIONS FORUM (TELFOR), 2018, : 104 - 107
  • [29] An Embedded Intrusion Detection System Model for Application Program
    Wu, Shaofei
    Chen, Yan
    PACIIA: 2008 PACIFIC-ASIA WORKSHOP ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION, VOLS 1-3, PROCEEDINGS, 2008, : 1861 - +
  • [30] A fuzzy data mining based intrusion detection model
    Jin, H
    Sun, JH
    Chen, H
    Han, ZF
    10TH IEEE INTERNATIONAL WORKSHOP ON FUTURE TRENDS OF DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2004, : 191 - 197