Monitoring System Calls for Anomaly Detection in Modern Operating Systems

被引:0
|
作者
Eskandari, Shayan [1 ]
Khreich, Wael [1 ]
Murtaza, Syed Shariyar [1 ]
Hamou-Lhadj, Abdelwahab [1 ]
Couture, Mario [2 ]
机构
[1] Concordia Univ, Software Behav Anal SBA Res Lab, Montreal, PQ, Canada
[2] Def Res & Dev Canada, Software Anal & Robustness Grp, Valcartier, PQ, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Host-Based Intrusion Detection Systems; Address space layout randomization; data execution prevention; software security and reliability;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Host-based intrusion detection systems monitor systems in operation for significant deviations from normal (and healthy) behaviour. Many approaches have been proposed in the literature. Most of them, however, do not consider even the basic attack prevention mechanisms that are activated by default on today's many operating systems. Examples of such mechanisms include Address Space Layout Randomization and Data Execution Prevention. With such security methods in place, attackers are forced to perform additional actions to circumvent them. In this research, we conjecture that some of these actions may require the use of additional system calls. If so, one can trace such attacks to discover attack patterns that can later be used to enhance the detection power of anomaly detection systems. The purpose of this short paper is to motivate the need to investigate the impact of attack on system calls while trying to overcome these prevention mechanisms.
引用
收藏
页码:19 / +
页数:2
相关论文
共 50 条
  • [41] APPLICATION OF THE COMPLEX EVENT PROCESSING SYSTEM FOR ANOMALY DETECTION AND NETWORK MONITORING
    Frankowski, Gerard
    Jerzak, Marcin
    Milostan, Maciej
    Nowak, Tomasz
    Pawlowski, Marek
    COMPUTER SCIENCE-AGH, 2015, 16 (04): : 351 - 371
  • [42] Crosstalk: A Scalable Cross-Protocol Monitoring System for Anomaly Detection
    di Pietro, Andrea
    Huici, Felipe
    Costantini, Diego
    Sugita, Takahide
    Niccolini, Saverio
    2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2010,
  • [43] Blockchain and Anomaly Detection based Monitoring System for Enforcing Wastewater Reuse
    Iyer, Sreerag
    Thakur, Snehal
    Dixit, Mihirraj
    Katkam, Rajneesh
    Agrawal, Ashish
    Kazi, Faruk
    2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,
  • [44] Real-time Detection for Anomaly Data in Microseismic Monitoring System
    Ji Chang-peng
    Liu Li-li
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND NATURAL COMPUTING, VOL II, 2009, : 307 - +
  • [45] Anomaly Detection in Operating System Logs with Deep Learning-Based Sentiment Analysis
    Studiawan, Hudan
    Sohel, Ferdous
    Payne, Christian
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (05) : 2136 - 2148
  • [46] Anomaly detection system by statistical analysis of incorrect signal about monitoring system of railway
    Makino N.
    Iwasaki A.
    Sakai S.
    Sugimoto J.
    Yamazaki H.
    Nihon Kikai Gakkai Ronbunshu, C Hen/Transactions of the Japan Society of Mechanical Engineers, Part C, 2010, 76 (762): : 459 - 464
  • [47] Observer-Based Anomaly Detection of Synchronous Generators for Power Systems Monitoring
    Anagnostou, Georgios
    Boem, Francesca
    Kuenzel, Stefanie
    Pal, Bikash C.
    Parisini, Thomas
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2018, 33 (04) : 4228 - 4237
  • [48] Anomaly Detection Strategies for Health-and-Usage Monitoring Systems in Helicopters' Transmissions
    Leoni, Jessica
    Tanelli, Mara
    Palman, Andrea
    EXPERT SYSTEMS WITH APPLICATIONS, 2022, 210
  • [49] A Dependable Monitoring Mechanism Combining Static and Dynamic Anomaly Detection for Network Systems
    Wang, GuiPing
    Chen, ShuYu
    Zhou, Zhen
    Lin, MingWei
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2014, 7 (01): : 1 - 18
  • [50] An extensible framework for ECG anomaly detection in wireless body sensor monitoring systems
    Sun, Le
    He, Jinyuan
    INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2019, 29 (02) : 101 - 110