Bridging the Gap between Data-flow and Control-flow Analysis for Anomaly Detection

被引:6
|
作者
Li, Peng [1 ]
Park, Hyundo [2 ]
Gao, Debin [3 ]
Fu, Jianming [4 ]
机构
[1] Univ N Carolina, Chapel Hill, NC 27515 USA
[2] Korea Univ, Seoul, South Korea
[3] Singapore Management Univ, Singapore 178902, Singapore
[4] Wuhan Univ, Wuhan 430072, Peoples R China
来源
24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS | 2008年
关键词
D O I
10.1109/ACSAC.2008.17
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Host-based anomaly detectors monitor the control-flow and data-flow behavior of system calls to detect intrusions. Control-flow-based detectors monitor the sequence of system calls, while data-flow-based detectors monitor the data propagation among arguments of system calls. Besides pointing out that data-flow-based detectors can be layered oil top of control-flow-based ones (or vice versa) to improve accuracy, there is a large gap between the two research directions in that research along one direction had been fairly isolated and had not made good use of results from the other direction. In this paper, we show how data-flow analysis can leverage results from control-flow analysis to learn more accurate and useful rules for anomaly detection. Our results show that the proposed control-flow-analysis-aided data-flow analysis reveals some accurate and useful rules that cannot be learned in prior data-flow analysis techniques. These relations among system call arguments and return values are useful in detecting many real attacks. A trace-driven evaluation shows that the proposed technique enjoys low false-alarm rates and overhead when implemented on a production server
引用
收藏
页码:392 / +
页数:2
相关论文
共 50 条
  • [31] Acceleration in convex data-flow analysis
    Leroux, Jerome
    Sutre, Gregoire
    FSTTCS 2007: FOUNDATIONS OF SOFTWARE TECHNOLOGY AND THEORETICAL COMPUTER SCIENCE, PROCEEDINGS, 2007, 4855 : 520 - 531
  • [32] Testability Analysis of Data-Flow Software
    Thanh Binh Nguyen
    Delaunay, Michel
    Robach, Chantal
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 116 : 213 - 225
  • [33] FUZZY ARRAY DATA-FLOW ANALYSIS
    COLLARD, JF
    BARTHOU, D
    FEAUTRIER, P
    SIGPLAN NOTICES, 1995, 30 (08): : 92 - 101
  • [34] Incremental method of data-flow analysis
    Lian, Rui-Qi
    Zhang, Zhao-Qing
    Qiao, Ru-Liang
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2002, 39 (02):
  • [35] Control-flow anomaly detection by process mining-based feature extraction and dimensionality reduction
    Vitale, Francesco
    Pegoraro, Marco
    van der Aalst, Wil M. P.
    Mazzocca, Nicola
    KNOWLEDGE-BASED SYSTEMS, 2025, 310
  • [36] CONTROL OF PARALLELISM IN THE MANCHESTER DATA-FLOW MACHINE
    RUGGIERO, CA
    SARGEANT, J
    LECTURE NOTES IN COMPUTER SCIENCE, 1987, 274 : 1 - 15
  • [37] Widening for Control-Flow
    Hardekopf, Ben
    Wiedermann, Ben
    Churchill, Berkeley
    Kashyap, Vineeth
    VERIFICATION, MODEL CHECKING, AND ABSTRACT INTERPRETATION: (VMCAI 2014), 2014, 8318 : 472 - 491
  • [38] Control-Flow Decoupling
    Sheikh, Rami
    Tuck, James
    Rotenberg, Eric
    2012 IEEE/ACM 45TH INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE (MICRO-45), 2012, : 329 - 340
  • [39] Load control mechanism for data-flow machines
    Takesue, Masaru
    Systems and Computers in Japan, 1988, 19 (10) : 55 - 69
  • [40] PARALLELISM CONTROL SCHEME IN A DATA-FLOW ARCHITECTURE
    KUSAKABE, S
    HOSHIDE, T
    TANIGUCHI, R
    AMAMIYA, M
    LECTURE NOTES IN COMPUTER SCIENCE, 1992, 634 : 743 - 748