Bridging the Gap between Data-flow and Control-flow Analysis for Anomaly Detection

被引:6
|
作者
Li, Peng [1 ]
Park, Hyundo [2 ]
Gao, Debin [3 ]
Fu, Jianming [4 ]
机构
[1] Univ N Carolina, Chapel Hill, NC 27515 USA
[2] Korea Univ, Seoul, South Korea
[3] Singapore Management Univ, Singapore 178902, Singapore
[4] Wuhan Univ, Wuhan 430072, Peoples R China
来源
24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS | 2008年
关键词
D O I
10.1109/ACSAC.2008.17
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Host-based anomaly detectors monitor the control-flow and data-flow behavior of system calls to detect intrusions. Control-flow-based detectors monitor the sequence of system calls, while data-flow-based detectors monitor the data propagation among arguments of system calls. Besides pointing out that data-flow-based detectors can be layered oil top of control-flow-based ones (or vice versa) to improve accuracy, there is a large gap between the two research directions in that research along one direction had been fairly isolated and had not made good use of results from the other direction. In this paper, we show how data-flow analysis can leverage results from control-flow analysis to learn more accurate and useful rules for anomaly detection. Our results show that the proposed control-flow-analysis-aided data-flow analysis reveals some accurate and useful rules that cannot be learned in prior data-flow analysis techniques. These relations among system call arguments and return values are useful in detecting many real attacks. A trace-driven evaluation shows that the proposed technique enjoys low false-alarm rates and overhead when implemented on a production server
引用
收藏
页码:392 / +
页数:2
相关论文
共 50 条
  • [1] Adding control-flow to a visual data-flow representation
    Dearman, D
    Cox, A
    Fisher, M
    13TH INTERNATIONAL WORKSHOP ON PROGRAM COMPREHENSION, PROCEEDINGS, 2005, : 297 - 306
  • [2] SOFTWARE-VALIDATION .1. CONTROL-FLOW AND DATA-FLOW ANALYSIS
    CARRE, BA
    MICROPROCESSORS AND MICROSYSTEMS, 1980, 4 (10) : 395 - 406
  • [3] Data-Flow vs Control-Flow for Extreme Level Computing
    Evripidou, Paraskevas
    Kyriacou, Costas
    2013 DATA-FLOW EXECUTION MODELS FOR EXTREME SCALE COMPUTING (DFM), 2014, : 9 - 13
  • [4] Control-flow semantics for assembly-level data-flow graphs
    Kahl, Wolfram
    Anand, Christopher K.
    Carette, Jacques
    RELATIONAL METHODS IN COMPUTER SCIENCE, 2005, 2006, 3929 : 147 - 160
  • [5] DATA-FLOW ANOMALY DETECTION OF RECURSIVE PROCEDURES
    LIVADAS, PE
    TSAO, QQ
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 1994, 50 (1-2) : 11 - 22
  • [6] Testing the Control-Flow, Data-Flow, and Time Aspects of Communication Systems: A Survey
    Dssouli, Rachida
    Khoumsi, Ahmed
    Elqortobi, Mounia
    Bentahar, Jamal
    ADVANCES IN COMPUTERS, VOL 107, 2017, 107 : 95 - 155
  • [7] TUGEN: An automatic test suite generator integrating data-flow and control-flow methods
    Wang, JG
    Hao, RB
    Wu, JP
    ICC 98 - 1998 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS VOLS 1-3, 1998, : 286 - 290
  • [8] TUGEN: An automatic test suite generator integrating data-flow and control-flow methods
    Wang, JG
    Hao, RB
    Wu, JP
    NEW TECHNOLOGIES ON COMPUTER SOFTWARE, 1997, : 212 - 217
  • [9] Transaction execution models in partially replicated transactional memory: The case for data-flow and control-flow
    Palmieri, Roberto
    Peluso, Sebastiano
    Ravindran, Binoy
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2015, 8913 : 341 - 366
  • [10] FROM CONTROL FLOW TO DATA-FLOW
    BECK, M
    JOHNSON, R
    PINGALI, K
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 1991, 12 (02) : 118 - 129