An Alternative Approach To Computer System Security Monitoring And Enhancement Through System Call Sequence Analysis

Dyuthi/Manakin Repository

An Alternative Approach To Computer System Security Monitoring And Enhancement Through System Call Sequence Analysis

Show full item record

Title: An Alternative Approach To Computer System Security Monitoring And Enhancement Through System Call Sequence Analysis
Author: Surekha, Mariam Varghese; Dr.Poulose Jacob, K
Abstract: Modern computer systems are plagued with stability and security problems: applications lose data, web servers are hacked, and systems crash under heavy load. Many of these problems or anomalies arise from rare program behavior caused by attacks or errors. A substantial percentage of the web-based attacks are due to buffer overflows. Many methods have been devised to detect and prevent anomalous situations that arise from buffer overflows. The current state-of-art of anomaly detection systems is relatively primitive and mainly depend on static code checking to take care of buffer overflow attacks. For protection, Stack Guards and I-leap Guards are also used in wide varieties.This dissertation proposes an anomaly detection system, based on frequencies of system calls in the system call trace. System call traces represented as frequency sequences are profiled using sequence sets. A sequence set is identified by the starting sequence and frequencies of specific system calls. The deviations of the current input sequence from the corresponding normal profile in the frequency pattern of system calls is computed and expressed as an anomaly score. A simple Bayesian model is used for an accurate detection.Experimental results are reported which show that frequency of system calls represented using sequence sets, captures the normal behavior of programs under normal conditions of usage. This captured behavior allows the system to detect anomalies with a low rate of false positives. Data are presented which show that Bayesian Network on frequency variations responds effectively to induced buffer overflows. It can also help administrators to detect deviations in program flow introduced due to errors.
Description: Department of Computer Science, Cochin University of Science and Technology.
URI: http://dyuthi.cusat.ac.in/purl/2929
Date: 2008-03


Files in this item

Files Size Format View Description
Dyuthi-T0920.pdf 2.557Mb PDF View/Open PDF

This item appears in the following Collection(s)

Show full item record

Search Dyuthi


Advanced Search

Browse

My Account