Monitoring System Calls for Anomaly Detection in Modern Operating Systems

被引:0
|
作者
Eskandari, Shayan [1 ]
Khreich, Wael [1 ]
Murtaza, Syed Shariyar [1 ]
Hamou-Lhadj, Abdelwahab [1 ]
Couture, Mario [2 ]
机构
[1] Concordia Univ, Software Behav Anal SBA Res Lab, Montreal, PQ, Canada
[2] Def Res & Dev Canada, Software Anal & Robustness Grp, Valcartier, PQ, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Host-Based Intrusion Detection Systems; Address space layout randomization; data execution prevention; software security and reliability;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Host-based intrusion detection systems monitor systems in operation for significant deviations from normal (and healthy) behaviour. Many approaches have been proposed in the literature. Most of them, however, do not consider even the basic attack prevention mechanisms that are activated by default on today's many operating systems. Examples of such mechanisms include Address Space Layout Randomization and Data Execution Prevention. With such security methods in place, attackers are forced to perform additional actions to circumvent them. In this research, we conjecture that some of these actions may require the use of additional system calls. If so, one can trace such attacks to discover attack patterns that can later be used to enhance the detection power of anomaly detection systems. The purpose of this short paper is to motivate the need to investigate the impact of attack on system calls while trying to overcome these prevention mechanisms.
引用
收藏
页码:19 / +
页数:2
相关论文
共 50 条
  • [31] An Anomaly-based Detection System for Monitoring Kubernetes Infrastructures
    Almaraz-Rivera, Josue Genaro
    IEEE LATIN AMERICA TRANSACTIONS, 2023, 21 (03) : 457 - 465
  • [32] LogSpy: System Log Anomaly Detection for Distributed Systems
    Li, Haoming
    Li, Yuguo
    2020 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND COMPUTER ENGINEERING (ICAICE 2020), 2020, : 347 - 352
  • [33] Anomaly Detection in a Logistic Operating System Using the Mahalanobis-Taguchi Method
    Asakura, Takumi
    Yashima, Wataru
    Suzuki, Kouki
    Shimotou, Makoto
    APPLIED SCIENCES-BASEL, 2020, 10 (12):
  • [34] A multi-layer model for anomaly intrusion detection using program sequences of system calls
    Hoang, XD
    Hu, H
    Bertok, P
    ICON 2003: 11TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, 2003, : 531 - 536
  • [35] A Host-based Anomaly Detection Approach by Representing System Calls as States of Kernel Modules
    Murtaza, Syed Shariyar
    Khreich, Wael
    Hamou-Lhadj, Abdelwahab
    Couture, Mario
    2013 IEEE 24TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE), 2013, : 431 - 440
  • [36] Monitoring Smartphones for Anomaly Detection
    Schmidt, Aubrey-Derrick
    Peters, Frank
    Lamour, Florian
    Scheel, Christian
    Camtepe, Seyit Ahmet
    Albayrak, Sahin
    MOBILE NETWORKS & APPLICATIONS, 2009, 14 (01): : 92 - 106
  • [37] Anomaly Detection in Embedded Systems using Simultaneous Power and Temperature Monitoring
    Abbasi, Zeinab
    Kargahi, Mehdi
    Mohaqeqi, Morteza
    2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2014, : 115 - 119
  • [38] Monitoring Smartphones for Anomaly Detection
    Aubrey-Derrick Schmidt
    Frank Peters
    Florian Lamour
    Christian Scheel
    Seyit Ahmet Çamtepe
    Şahin Albayrak
    Mobile Networks and Applications, 2009, 14 : 92 - 106
  • [39] Explainable AI for Event and Anomaly Detection and Classification in Healthcare Monitoring Systems
    Abououf, Menatalla
    Singh, Shakti
    Mizouni, Rabeb
    Otrok, Hadi
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (02) : 3446 - 3457
  • [40] Anomaly Detection with Machine Learning Models Using API Calls
    Sahin, Varol
    Satilmis, Hami
    Yazar, Bilge Kagan
    Akleylek, Sedat
    INFORMATION TECHNOLOGIES AND THEIR APPLICATIONS, PT II, ITTA 2024, 2025, 2226 : 298 - 309