An architecture for specification-based detection of semantic integrity violations in kernel dynamic data

被引:0
|
作者
Petroni, Nick L., Jr. [1 ]
Fraser, Timothy
Walters, Aaron
Arbaugh, William A.
机构
[1] Univ Maryland, Dept Comp Sci, College Pk, MD 20742 USA
[2] Univ Maryland, Inst Adv Comp Studies, College Pk, MD 20742 USA
[3] Purdue Univ, W Lafayette, IN 47907 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The ability of intruders to hide their presence in compromised systems has surpassed the ability of the current generation of integrity monitors to detect them. Once in control of a system, intruders modify the state of constantly-changing dynamic kernel data structures to hide their processes and elevate their privileges. Current monitoring tools are limited to detecting changes in nominally static kernel data and text and cannot distinguish a valid state change from tampering in these dynamic data structures. We introduce a novel general architecture for defining and monitoring, semantic integrity constraints using a specification language-based approach. This approach will enable a new generation of integrity monitors to distinguish valid states from tampering.
引用
收藏
页码:289 / 304
页数:16
相关论文
共 50 条
  • [31] A Protocol Specification-Based Intrusion Detection System for VoIP and Its Evaluation
    Phit, Thyda
    Abe, Koki
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2008, E91B (12) : 3956 - 3965
  • [32] Generating test data for specification-based tests via quasirandom sequences
    Chi, Hongmei
    Jones, Edward L.
    Evans, Deidre W.
    Brown, Martin
    COMPUTATIONAL SCIENCE - ICCS 2006, PT 4, PROCEEDINGS, 2006, 3994 : 773 - 780
  • [33] A Survey of Specification-based Intrusion Detection Techniques for Cyber-Physical Systems
    Nweke, Livinus Obiora
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (05) : 37 - 45
  • [34] Specification-based intrusion detection for H.323-based voice over IP
    Truong, P
    Nieh, D
    Moh, M
    2005 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), Vols 1 and 2, 2005, : 387 - 392
  • [35] SQL-IDS: A Specification-based Approach for SQL-Injection Detection
    Kemalis, Konstantinos
    Tzouramanis, Theodoros
    APPLIED COMPUTING 2008, VOLS 1-3, 2008, : 2153 - 2158
  • [36] Formal reasoning about a specification-based intrusion detection for dynamic auto-configuration rotocols in ad hoc networks
    Song, T
    Ko, C
    Tseng, CH
    Balasubramanyam, P
    Chaudhary, A
    Levitt, KN
    FORMAL ASPECTS IN SECURITY AND TRUST, 2006, 3866 : 16 - 33
  • [37] Delivering Specification-Based Learning Processes with Service-Oriented Architecture: A Process Translation Approach
    Chen, Chien-Tsun
    Cheng, Yu Chin
    Hsieh, Chin-Yun
    Hsu, Tien-Song
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2009, 25 (05) : 1373 - 1389
  • [38] SMDAps: A Specification-based Misbehavior Detection System for Implantable Devices in Artificial Pancreas System
    Astillo, Philip Virgil
    Jeong, Jaemin
    Chien, Wei-Che
    Kim, Bonam
    Jang, JoungSoon
    You, Ilsun
    JOURNAL OF INTERNET TECHNOLOGY, 2021, 22 (01): : 1 - 11
  • [39] Delivering specification-based learning processes with service-oriented architecture: A process translation approach
    Chen, Chien-Tsun
    Cheng, Yu Chin
    Hsieh, Chin-Yun
    Hsu, Tien-Song
    Journal of Information Science and Engineering, 2009, 25 (5 SPECIAL ISSUE) : 1373 - 1389
  • [40] KERNEL CODE INTEGRITY PROTECTION BASED ON A VIRTUALIZED MEMORY ARCHITECTURE
    Sun, Jianhua
    Chen, Hao
    Chang, Cheng
    Li, Xingbang
    COMPUTING AND INFORMATICS, 2013, 32 (02) : 295 - 311