Bridging the Gap between Data-flow and Control-flow Analysis for Anomaly Detection

被引:6
|
作者
Li, Peng [1 ]
Park, Hyundo [2 ]
Gao, Debin [3 ]
Fu, Jianming [4 ]
机构
[1] Univ N Carolina, Chapel Hill, NC 27515 USA
[2] Korea Univ, Seoul, South Korea
[3] Singapore Management Univ, Singapore 178902, Singapore
[4] Wuhan Univ, Wuhan 430072, Peoples R China
来源
24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS | 2008年
关键词
D O I
10.1109/ACSAC.2008.17
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Host-based anomaly detectors monitor the control-flow and data-flow behavior of system calls to detect intrusions. Control-flow-based detectors monitor the sequence of system calls, while data-flow-based detectors monitor the data propagation among arguments of system calls. Besides pointing out that data-flow-based detectors can be layered oil top of control-flow-based ones (or vice versa) to improve accuracy, there is a large gap between the two research directions in that research along one direction had been fairly isolated and had not made good use of results from the other direction. In this paper, we show how data-flow analysis can leverage results from control-flow analysis to learn more accurate and useful rules for anomaly detection. Our results show that the proposed control-flow-analysis-aided data-flow analysis reveals some accurate and useful rules that cannot be learned in prior data-flow analysis techniques. These relations among system call arguments and return values are useful in detecting many real attacks. A trace-driven evaluation shows that the proposed technique enjoys low false-alarm rates and overhead when implemented on a production server
引用
收藏
页码:392 / +
页数:2
相关论文
共 50 条
  • [21] On Bridging the Gap between Control Flow Integrity and Attestation Schemes
    Ammar, Mahmoud
    Abdelraoof, Ahmed
    Vlasceanu, Silviu
    Proceedings of the 33rd USENIX Security Symposium, 2024, : 6633 - 6650
  • [22] Complex Control-Flow Constructs Detection from Process Related Data
    R'bigui, Hind
    Cho, Chiwoon
    2019 21ST INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ICT FOR 4TH INDUSTRIAL REVOLUTION, 2019, : 579 - 582
  • [23] Control-Flow Analysis of Functional Programs
    Midtgaard, Jan
    ACM COMPUTING SURVEYS, 2012, 44 (03)
  • [24] Pushdown Control-Flow Analysis for Free
    Gilray, Thomas
    Lyde, Steven
    Adams, Michael D.
    Might, Matthew
    Van Horn, David
    ACM SIGPLAN NOTICES, 2016, 51 (01) : 691 - 704
  • [25] Control-flow analysis in cubic time
    Nielson, F
    Seidl, H
    PROGRAMMING LANGUAGES AND SYSTEMS, PROCEEDINGS, 2001, 2028 : 252 - 268
  • [26] THE SEMANTICS OF SCHEME CONTROL-FLOW ANALYSIS
    SHIVERS, O
    SIGPLAN NOTICES, 1991, 26 (09): : 190 - 198
  • [27] DATA FLOW ANOMALY DETECTION
    JACHNER, J
    AGARWAL, VK
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1984, 10 (04) : 432 - 437
  • [28] Data-flow analysis for MPI programs
    Strout, Michelle Mills
    Kreaseck, Barbara
    Hovland, Paul D.
    2006 INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING, PROCEEDINGS, 2006, : 175 - 184
  • [29] Data-flow analysis of program fragments
    Rountev, A
    Ryder, BG
    Landi, W
    SOFTWARE ENGINEERING - ESEC/FSE '99, PROCEEDINGS, 1999, 1687 : 235 - 252
  • [30] INCREMENTAL DATA-FLOW ANALYSIS ALGORITHMS
    RYDER, BG
    PAULL, MC
    ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 1988, 10 (01): : 1 - 50