A Lightweight Host-Based Intrusion Detection based on Process Generation Patterns

被引:1
|
作者
Tsuda, Yu [1 ]
Nakazato, Junji [2 ]
Takagi, Yaichiro [1 ]
Inoue, Daisuke [1 ]
Nakao, Koji [1 ]
Terada, Kenjiro [1 ]
机构
[1] Natl Inst Informat & Commun Technol, Tokyo, Japan
[2] FUJITSU LABS LTD, Kawasaki, Kanagawa, Japan
关键词
D O I
10.1109/AsiaJCIS.2018.00025
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advanced persistent threat (APT) has been considered globally as a serious social problem since the 2010s. Adversaries of this threat, at first, try to penetrate into targeting organizations by using a backdoor which is opened with drive-by-download attacks, malicious e-mail attachments, etc. After adversaries' intruding, they usually execute benign applications (e.g, OS built-in commands, management tools published by OS vendors, etc.) for investigating networks of targeting organizations. Therefore, if they penetrate into networks once, it is difficult to rapidly detect these malicious activities only by using anti-virus software or network-based intrusion systems. Meanwhile, enterprise networks are managed well in general. That means network administrators have a good grasp of installed applications and routinely used applications for employees' daily works. Thereby, in order to find anomaly behaviors on well-managed networks, it is effective to observe changes executing their applications. In this paper, we propose a lightweight host-based intrusion detection system by using process generation patterns. Our system periodically collects lists of active processes from each host, then the system constructs process trees from the lists. In addition, the system detects anomaly processes from the process trees considering parent-child relationships, execution sequences and lifetime of processes. Moreover, we evaluated the system in our organization. The system collected 2, 403, 230 process paths in total from 498 hosts for two months, then the system could extract 38 anomaly processes. Among them, one PowerShell process was also detected by using an anti-virus software running on our organization. Furthermore, our system could filter out the other 18 PowerShell processes, which were used for maintenance of our network.
引用
收藏
页码:102 / 108
页数:7
相关论文
共 50 条
  • [21] On Effective Sampling Techniques for Host-based Intrusion Detection in MANET
    Ge, Linqiang
    Zhang, Difan
    Hardy, Rommie
    Liu, Hui
    Yu, Wei
    Reschly, Robert
    2012 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2012), 2012,
  • [22] Host-Based Intrusion Detection Model Using Siamese Network
    Park, Daekyeong
    Kim, Sangsoo
    Kwon, Hyukjin
    Shin, Dongil
    Shin, Dongkyoo
    IEEE ACCESS, 2021, 9 : 76614 - 76623
  • [23] Host-based intrusion detection by monitoring windows registry accesses
    Topallar, M
    Depren, MÖ
    Anarim, E
    Ciliz, K
    PROCEEDINGS OF THE IEEE 12TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE, 2004, : 728 - 731
  • [24] Application of Sequence Embedding in Host-based Intrusion Detection System
    Lu, Yijun
    Teng, Shaohua
    PROCEEDINGS OF THE 2021 IEEE 24TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD), 2021, : 434 - 439
  • [25] Enhancing the accuracy of network-based intrusion detection with host-based context
    Dreger, H
    Kreibich, C
    Paxson, V
    Sommer, R
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, PROCEEDINGS, 2005, 3548 : 206 - 221
  • [26] The architecture of host-based intrusion detection model generation system for the frequency per system call
    Paek, Seung-Hyun
    Oh, Yoon-Keun
    Yun, JooBeom
    Lee, Do-Hoon
    2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2006, : 277 - 283
  • [27] On Effective Data Aggregation Techniques In Host-based Intrusion Detection in MANET
    Zhang, Difan
    Ge, Linqiang
    Hardy, Rommie
    Yu, Wei
    Zhang, Hanlin
    Reschly, Robert
    2013 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2013, : 85 - 90
  • [28] Host-Based Intrusion Detection for VANETs: A Statistical Approach to Rogue Node Detection
    Zaidi, Kamran
    Milojevic, Milos B.
    Rakocevic, Veselin
    Nallanathan, Arumugam
    Rajarajan, Muttukrishnan
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (08) : 6703 - 6714
  • [29] Host-based intrusion detection using self-organizing maps
    Lichodzijewski, P
    Zincir-Heywood, AN
    Heywood, MI
    PROCEEDING OF THE 2002 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, VOLS 1-3, 2002, : 1714 - 1719
  • [30] Towards a better similarity algorithm for host-based intrusion detection system
    Ouarda, Lounis
    Malika, Bourenane
    Brahim, Bouderah
    JOURNAL OF INTELLIGENT SYSTEMS, 2023, 32 (01)