A Lightweight Host-Based Intrusion Detection based on Process Generation Patterns

被引:1
|
作者
Tsuda, Yu [1 ]
Nakazato, Junji [2 ]
Takagi, Yaichiro [1 ]
Inoue, Daisuke [1 ]
Nakao, Koji [1 ]
Terada, Kenjiro [1 ]
机构
[1] Natl Inst Informat & Commun Technol, Tokyo, Japan
[2] FUJITSU LABS LTD, Kawasaki, Kanagawa, Japan
关键词
D O I
10.1109/AsiaJCIS.2018.00025
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advanced persistent threat (APT) has been considered globally as a serious social problem since the 2010s. Adversaries of this threat, at first, try to penetrate into targeting organizations by using a backdoor which is opened with drive-by-download attacks, malicious e-mail attachments, etc. After adversaries' intruding, they usually execute benign applications (e.g, OS built-in commands, management tools published by OS vendors, etc.) for investigating networks of targeting organizations. Therefore, if they penetrate into networks once, it is difficult to rapidly detect these malicious activities only by using anti-virus software or network-based intrusion systems. Meanwhile, enterprise networks are managed well in general. That means network administrators have a good grasp of installed applications and routinely used applications for employees' daily works. Thereby, in order to find anomaly behaviors on well-managed networks, it is effective to observe changes executing their applications. In this paper, we propose a lightweight host-based intrusion detection system by using process generation patterns. Our system periodically collects lists of active processes from each host, then the system constructs process trees from the lists. In addition, the system detects anomaly processes from the process trees considering parent-child relationships, execution sequences and lifetime of processes. Moreover, we evaluated the system in our organization. The system collected 2, 403, 230 process paths in total from 498 hosts for two months, then the system could extract 38 anomaly processes. Among them, one PowerShell process was also detected by using an anti-virus software running on our organization. Furthermore, our system could filter out the other 18 PowerShell processes, which were used for maintenance of our network.
引用
收藏
页码:102 / 108
页数:7
相关论文
共 50 条
  • [41] Generating Host-Based Data from Network Traces for Intrusion Detection
    Day, Patrick
    Iannucci, Stefano
    Banicescu, Ioana
    2023 IEEE 47TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC, 2023, : 268 - 273
  • [42] Applying host-based intrusion detection to critical communication infrastructure components
    Bowen, TF
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL V, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING: I, 2003, : 452 - 457
  • [43] Multivariate statistical analysis of audit trails for host-based intrusion detection
    Ye, N
    Emran, SM
    Chen, Q
    Vilbert, S
    IEEE TRANSACTIONS ON COMPUTERS, 2002, 51 (07) : 810 - 820
  • [44] Enhancing Security of Host-Based Intrusion Detection Systems for the Internet of Things
    Nallakaruppan, M. K.
    Somayaji, Siva Rama Krishnan
    Fuladi, Siddhesh
    Benedetto, Francesco
    Ulaganathan, Senthil Kumaran
    Yenduri, Gokul
    IEEE ACCESS, 2024, 12 : 31788 - 31797
  • [45] On effective data aggregation techniques in host-based intrusion detection in MANET
    Zhang, Difan
    Ge, Linqiang
    Yu, Wei
    Zhang, Hanlin
    Hardy, Rommie L.
    Reschly, Robert J.
    International Journal of Security and Networks, 2013, 8 (04) : 179 - 193
  • [46] A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguous and Discontiguous System Call Patterns
    Creech, Gideon
    Hu, Jiankun
    IEEE TRANSACTIONS ON COMPUTERS, 2014, 63 (04) : 807 - 819
  • [47] Towards Profiling Program Instances in Host-Based Intrusion Detection Systems by Recognizing Software Update Patterns
    Koivunen, Lauri
    Rauti, Sampsa
    Leppanen, Ville
    11TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS (SIN 2018), 2018,
  • [48] A Modern Implementation of System Call Sequence Based Host-based Intrusion Detection Systems
    Byrnes, Jeffrey
    Hoang, Thomas
    Mehta, Nihal Nitin
    Cheng, Yuan
    2020 SECOND IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2020), 2020, : 218 - 225
  • [49] Multi-level host-based intrusion detection system for Internet of things
    Robin Gassais
    Naser Ezzati-Jivan
    Jose M. Fernandez
    Daniel Aloise
    Michel R. Dagenais
    Journal of Cloud Computing, 9
  • [50] Host-based intrusion detection system for secure human-centric computing
    Daesung Moon
    Sung Bum Pan
    Ikkyun Kim
    The Journal of Supercomputing, 2016, 72 : 2520 - 2536