A Lightweight Host-Based Intrusion Detection based on Process Generation Patterns

被引:1
|
作者
Tsuda, Yu [1 ]
Nakazato, Junji [2 ]
Takagi, Yaichiro [1 ]
Inoue, Daisuke [1 ]
Nakao, Koji [1 ]
Terada, Kenjiro [1 ]
机构
[1] Natl Inst Informat & Commun Technol, Tokyo, Japan
[2] FUJITSU LABS LTD, Kawasaki, Kanagawa, Japan
关键词
D O I
10.1109/AsiaJCIS.2018.00025
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advanced persistent threat (APT) has been considered globally as a serious social problem since the 2010s. Adversaries of this threat, at first, try to penetrate into targeting organizations by using a backdoor which is opened with drive-by-download attacks, malicious e-mail attachments, etc. After adversaries' intruding, they usually execute benign applications (e.g, OS built-in commands, management tools published by OS vendors, etc.) for investigating networks of targeting organizations. Therefore, if they penetrate into networks once, it is difficult to rapidly detect these malicious activities only by using anti-virus software or network-based intrusion systems. Meanwhile, enterprise networks are managed well in general. That means network administrators have a good grasp of installed applications and routinely used applications for employees' daily works. Thereby, in order to find anomaly behaviors on well-managed networks, it is effective to observe changes executing their applications. In this paper, we propose a lightweight host-based intrusion detection system by using process generation patterns. Our system periodically collects lists of active processes from each host, then the system constructs process trees from the lists. In addition, the system detects anomaly processes from the process trees considering parent-child relationships, execution sequences and lifetime of processes. Moreover, we evaluated the system in our organization. The system collected 2, 403, 230 process paths in total from 498 hosts for two months, then the system could extract 38 anomaly processes. Among them, one PowerShell process was also detected by using an anti-virus software running on our organization. Furthermore, our system could filter out the other 18 PowerShell processes, which were used for maintenance of our network.
引用
收藏
页码:102 / 108
页数:7
相关论文
共 50 条
  • [1] Anomaly Generation Using Generative Adversarial Networks in Host-Based Intrusion Detection
    Salem, Milad
    Taheri, Shayan
    Yuan, Jiann Shiun
    2018 9TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2018, : 683 - 687
  • [2] DAHID: Domain Adaptive Host-based Intrusion Detection
    Ajayi, Oluwagbemiga
    Gangopadhyay, Aryya
    PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, : 467 - 472
  • [3] A Novel Mechanism for Host-Based Intrusion Detection System
    Harshitha, Ch Gayathri
    Rao, M. Kameswara
    Kumar, P. Neelesh
    FIRST INTERNATIONAL CONFERENCE ON SUSTAINABLE TECHNOLOGIES FOR COMPUTATIONAL INTELLIGENCE, 2020, 1045 : 527 - 536
  • [4] Methods for Host-based Intrusion Detection with Deep Learning
    Ring J.H.
    Van Oort C.M.
    Durst S.
    White V.
    Near J.P.
    Skalka C.
    Digital Threats: Research and Practice, 2021, 2 (04):
  • [5] A Behavioral Graph Model for Host-Based Intrusion Detection
    Cao, Zechun
    Huang, Shou-Hsuan Stephen
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2023, 18 (02): : 48 - 57
  • [6] The Design and Implementation of Host-based Intrusion Detection System
    Lin Ying
    Zhang Yan
    Ou Yang-Jia
    2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 595 - 598
  • [7] Host-Based Intrusion Detection Using Statistical Approaches
    Gautam, Sunil Kumar
    Om, Hari
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2015, 2016, 404 : 481 - 493
  • [8] Sequence Covering for Efficient Host-Based Intrusion Detection
    Martea, Pierre-Francois
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (04) : 994 - 1006
  • [9] Using Graph Representation in Host-Based Intrusion Detection
    Hu, Zhichao
    Liu, Likun
    Yu, Haining
    Yu, Xiangzhan
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [10] Host-based intrusion detection for advanced mobile devices
    Miettinen, Markus
    Halonen, Perttu
    Hatonen, Kimmo
    20TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, PROCEEDINGS, 2006, : 72 - 76