Monitoring System Calls for Anomaly Detection in Modern Operating Systems

被引:0
|
作者
Eskandari, Shayan [1 ]
Khreich, Wael [1 ]
Murtaza, Syed Shariyar [1 ]
Hamou-Lhadj, Abdelwahab [1 ]
Couture, Mario [2 ]
机构
[1] Concordia Univ, Software Behav Anal SBA Res Lab, Montreal, PQ, Canada
[2] Def Res & Dev Canada, Software Anal & Robustness Grp, Valcartier, PQ, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Host-Based Intrusion Detection Systems; Address space layout randomization; data execution prevention; software security and reliability;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Host-based intrusion detection systems monitor systems in operation for significant deviations from normal (and healthy) behaviour. Many approaches have been proposed in the literature. Most of them, however, do not consider even the basic attack prevention mechanisms that are activated by default on today's many operating systems. Examples of such mechanisms include Address Space Layout Randomization and Data Execution Prevention. With such security methods in place, attackers are forced to perform additional actions to circumvent them. In this research, we conjecture that some of these actions may require the use of additional system calls. If so, one can trace such attacks to discover attack patterns that can later be used to enhance the detection power of anomaly detection systems. The purpose of this short paper is to motivate the need to investigate the impact of attack on system calls while trying to overcome these prevention mechanisms.
引用
收藏
页码:19 / +
页数:2
相关论文
共 50 条
  • [21] Integrating Intelligent Anomaly Detection Agents into Distributed Monitoring Systems
    Florez-Larrahondo, German
    Liu, Zhen
    Dandass, Yoginder S.
    Bridges, Susan M.
    Vaughn, Rayford
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2006, 1 (01): : 60 - 77
  • [22] Intelligent systems for sitting posture monitoring and anomaly detection: an overview
    Patrick Vermander
    Aitziber Mancisidor
    Itziar Cabanes
    Nerea Perez
    Journal of NeuroEngineering and Rehabilitation, 21
  • [23] Anomaly detection of program behaviors based on system calls and homogeneous Markov chain models
    Tian, Xinguang
    Gao, Lizhi
    Sun, Chunlai
    Zhang, Eryang
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2007, 44 (09): : 1538 - 1544
  • [24] Security Testing for Operating System and Its System Calls
    Zhai, Gaoshou
    Niu, Hanhui
    Yang, Na
    Tian, Minli
    Liu, Chengyu
    Yang, Hengsheng
    SECURITY TECHNOLOGY, PROCEEDINGS, 2009, 58 : 116 - 123
  • [25] Hierarchical Attention-Based Anomaly Detection Model for Embedded Operating Systems
    Ezeme, Mellitus O.
    Mahmoud, Qusay H.
    Azim, Akramul
    2018 IEEE 24TH INTERNATIONAL CONFERENCE ON EMBEDDED AND REAL-TIME COMPUTING SYSTEMS AND APPLICATIONS (RTCSA), 2018, : 225 - 231
  • [26] Evading System-Calls Based Intrusion Detection Systems
    Rosenberg, Ishai
    Gudes, Ehud
    NETWORK AND SYSTEM SECURITY, (NSS 2016), 2016, 9955 : 200 - 216
  • [27] Investigating Intrusion Detection Systems That Use Trails of System calls
    Amer, Suhair Hafez
    Hamilton, John A., Jr.
    PROCEEDINGS OF THE 2008 INTERNATIONAL SYMPOSIUM ON PERFORMANCE EVALUATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS, 2008, : 377 - 384
  • [28] Bypassing system calls-based intrusion detection systems
    Rosenberg, Ishai
    Gudes, Ehud
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (16):
  • [29] Process Monitoring System Based On Anomaly Detection Statistics Algorithm
    Zhang, Lijuan
    APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 408 - 411
  • [30] A Prototype System for Urban Water Consumption Monitoring and Anomaly Detection
    Czako, Zoltan
    Hangan, Anca
    Lisman, Dragos
    Sebestyen, Gheorghe
    Deszi, Marcus-Mihai
    2022 IEEE 18TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTER COMMUNICATION AND PROCESSING, ICCP, 2022, : 17 - 23