An architecture for specification-based detection of semantic integrity violations in kernel dynamic data

被引:0
|
作者
Petroni, Nick L., Jr. [1 ]
Fraser, Timothy
Walters, Aaron
Arbaugh, William A.
机构
[1] Univ Maryland, Dept Comp Sci, College Pk, MD 20742 USA
[2] Univ Maryland, Inst Adv Comp Studies, College Pk, MD 20742 USA
[3] Purdue Univ, W Lafayette, IN 47907 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The ability of intruders to hide their presence in compromised systems has surpassed the ability of the current generation of integrity monitors to detect them. Once in control of a system, intruders modify the state of constantly-changing dynamic kernel data structures to hide their processes and elevate their privileges. Current monitoring tools are limited to detecting changes in nominally static kernel data and text and cannot distinguish a valid state change from tampering in these dynamic data structures. We introduce a novel general architecture for defining and monitoring, semantic integrity constraints using a specification language-based approach. This approach will enable a new generation of integrity monitors to distinguish valid states from tampering.
引用
收藏
页码:289 / 304
页数:16
相关论文
共 50 条
  • [1] A SPECIFICATION-BASED DATA MODEL
    GANDHI, M
    ROBERTSON, EL
    LECTURE NOTES IN COMPUTER SCIENCE, 1992, 645 : 194 - 209
  • [2] The specification-based testing of a trusted kernel: MK++
    Ford, RL
    Simon, RT
    Bevier, WR
    Smith, LM
    FIRST IEEE INTERNATIONAL CONFERENCE ON FORMAL ENGINEERING METHODS, PROCEEDINGS, 1997, : 151 - 160
  • [3] Specification-based intrusion detection in WLANs
    Gill, Rupinder
    Smith, Jason
    Clark, Andrew
    22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 141 - +
  • [4] Specification-Based Intrusion Detection Using Sequence Alignment and Data Clustering
    Kountche, Djibrilla Amadou
    Gombault, Sylvain
    FUTURE NETWORK SYSTEMS AND SECURITY, FNSS 2015, 2015, 523 : 31 - 46
  • [5] Specification-based data reduction in dimensional data warehouses
    Skyt, Janne
    Jensen, Christian S.
    Pedersen, Torben Bach
    INFORMATION SYSTEMS, 2008, 33 (01) : 36 - 63
  • [6] Specification-based data reduction in dimensional data warehouses
    Skyt, J
    Jensen, CS
    Pedersen, TB
    18TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, PROCEEDINGS, 2002, : 278 - 278
  • [7] Approach of specification-based mixed intrusion detection
    Mu, Wei
    Song, Hua
    Dai, Yiqi
    Jisuanji Gongcheng/Computer Engineering, 2005, 31 (09): : 132 - 134
  • [8] A specification-based intrusion detection model for OLSR
    Tseng, CH
    Song, T
    Balasubramanyam, P
    Ko, C
    Levitt, K
    RECENT ADVANCES IN INTRUSION DETECTION, 2006, 3858 : 330 - 350
  • [9] On the symbiosis of specification-based and anomaly-based detection
    Stakhanova, Natalia
    Basu, Samik
    Wong, Johnny
    COMPUTERS & SECURITY, 2010, 29 (02) : 253 - 268
  • [10] Static specification analysis for termination of specification-based data structure repair
    Demsky, B
    Rinard, M
    ISSRE 2003: 14TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING, PROCEEDINGS, 2003, : 71 - 84