Bridging the Gap between Data-flow and Control-flow Analysis for Anomaly Detection

被引:6
|
作者
Li, Peng [1 ]
Park, Hyundo [2 ]
Gao, Debin [3 ]
Fu, Jianming [4 ]
机构
[1] Univ N Carolina, Chapel Hill, NC 27515 USA
[2] Korea Univ, Seoul, South Korea
[3] Singapore Management Univ, Singapore 178902, Singapore
[4] Wuhan Univ, Wuhan 430072, Peoples R China
来源
24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS | 2008年
关键词
D O I
10.1109/ACSAC.2008.17
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Host-based anomaly detectors monitor the control-flow and data-flow behavior of system calls to detect intrusions. Control-flow-based detectors monitor the sequence of system calls, while data-flow-based detectors monitor the data propagation among arguments of system calls. Besides pointing out that data-flow-based detectors can be layered oil top of control-flow-based ones (or vice versa) to improve accuracy, there is a large gap between the two research directions in that research along one direction had been fairly isolated and had not made good use of results from the other direction. In this paper, we show how data-flow analysis can leverage results from control-flow analysis to learn more accurate and useful rules for anomaly detection. Our results show that the proposed control-flow-analysis-aided data-flow analysis reveals some accurate and useful rules that cannot be learned in prior data-flow analysis techniques. These relations among system call arguments and return values are useful in detecting many real attacks. A trace-driven evaluation shows that the proposed technique enjoys low false-alarm rates and overhead when implemented on a production server
引用
收藏
页码:392 / +
页数:2
相关论文
共 50 条
  • [41] Control-Flow Residual Analysis for Symbolic Automata
    Azzopardi, Shaun
    Colombo, Christian
    Pace, Gordon J.
    ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2017, (254): : 29 - 43
  • [42] CEDA: Control-Flow Error Detection Using Assertions
    Vemu, Ramtilak
    Abraham, Jacob A.
    IEEE TRANSACTIONS ON COMPUTERS, 2011, 60 (09) : 1233 - 1245
  • [43] Trace-Based Control-Flow Analysis
    Montagu, Benoit
    Jensen, Thomas
    PROCEEDINGS OF THE 42ND ACM SIGPLAN INTERNATIONAL CONFERENCE ON PROGRAMMING LANGUAGE DESIGN AND IMPLEMENTATION (PLDI '21), 2021, : 482 - 496
  • [44] DATA-FLOW ARCHITECTURES
    CULLER, A
    CULLER, DE
    ANNUAL REVIEW OF COMPUTER SCIENCE, 1986, 1 : 225 - 253
  • [45] DATA-FLOW ARCHITECTURE
    LERNER, EJ
    IEEE SPECTRUM, 1984, 21 (04) : 57 - 62
  • [46] DATA-FLOW AT MIT
    DETTMER, R
    ELECTRONICS AND POWER, 1986, 32 (08): : 570 - 571
  • [47] DATA-FLOW MULTITASKING
    KAR, RP
    DR DOBBS JOURNAL, 1989, 14 (11): : 16 - &
  • [48] Cool:: A control-flow generator for system analysis
    Braun, V
    Knoop, J
    Koschützki, D
    COMPILER CONSTRUCTION, 1998, 1383 : 306 - 309
  • [49] A control-flow analysis for a calculus of concurrent objects
    Di Blasio, P
    Fisher, K
    Talcott, C
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2000, 26 (07) : 617 - 634
  • [50] Termination Analysis of Programs with Multiphase Control-Flow
    Domenech, Jesus J.
    Genaim, Samir
    ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2021, (344): : 13 - 21