Colored Petri Nets as the Enabling Technology in Intrusion Detection Systems

被引:0
|
作者
Dolgikh, A. [1 ]
Nykodym, T. [1 ]
Skormin, V. [1 ]
Antonakos, J. [2 ]
Baimukhamedov, M. [3 ]
机构
[1] SUNY Binghamton, Binghamton, NY 13902 USA
[2] SUNY Broome Community Coll, Binghamton, NY 13901 USA
[3] Kostanai Tech Univ, Kostanai, Kazakhstan
关键词
behavior based IDS; Colored Petri Net; functionality detection; behavior detection;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Behavior based intrusion detection technologies are increasingly popular. Traditionally behavior patterns are expressed as specific signatures defined in the system call domain. This approach has various drawbacks and is vulnerable to possible obfuscations. The IDS approach discussed herein addresses process behavior in terms of functionalities, i.e. particular process objectives. The functionalities are formalized in the form that is independent of their specific realizations and is obfuscation resistant. The malware is detected by particular sets of functionalities exposed by programs during their execution. The approach implies the selection of common malicious functionalities, followed by formal description of these functionalities via specific system call combinations. In the detection domain, monitored system calls are combined into API functions utilizing Colored Petri nets (CPN). After that API functions are combined into malicious functionalities, indicative of malware attack, also using CPN. The advantages of CPN utilization for dynamic code analysis are described. By its nature the described approach is signature-based. The CPN technology is the backbone of the described approach: CPNs are used to define the functionalities of interests as behavior signatures, and at the same time serve as the mechanism for the signature detection. The paper describes a unique general-purpose software tool implementing CPN. It constitutes the enabling technology for the described IDS approach, and has many additional applications for modeling and monitoring complex hierarchical systems of discrete events.
引用
收藏
页码:1297 / 1301
页数:5
相关论文
共 50 条
  • [1] Distributed intrusion detection system modeling and simulation using hierarchical colored Petri nets
    Yan, HZ
    Hu, CZ
    Tan, HM
    ISTM/2005: 6th International Symposium on Test and Measurement, Vols 1-9, Conference Proceedings, 2005, : 3824 - 3827
  • [2] COLORED PETRI NETS
    JENSEN, K
    LECTURE NOTES IN COMPUTER SCIENCE, 1987, 254 : 248 - 299
  • [3] AN INTRODUCTION TO SYSTEMS MODELING AND SIMULATION WITH COLORED PETRI NETS
    Gehlot, Vijay
    Nigro, Carmen
    PROCEEDINGS OF THE 2010 WINTER SIMULATION CONFERENCE, 2010, : 104 - 118
  • [4] Modeling interactive systems with hierarchical colored Petri nets
    Elkoutbi, M
    Keller, RK
    PROCEEDINGS OF THE HIGH-PERFORMANCE COMPUTING (HPC'98), 1998, : 432 - 437
  • [5] Backward reachability of Colored Petri Nets for systems diagnosis
    Bouali, Mohamed
    Barger, Pavol
    Schon, Walter
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 2012, 99 : 1 - 14
  • [6] Colored Petri nets for modeling of networked control systems
    Farah, Khamsa
    Chabir, Karim
    Abdelkrim, Mohamed Naceur
    2019 19TH INTERNATIONAL CONFERENCE ON SCIENCES AND TECHNIQUES OF AUTOMATIC CONTROL AND COMPUTER ENGINEERING (STA), 2019, : 226 - 230
  • [7] Using colored Petri nets to simulate object Petri nets
    Corchado, FFR
    Gallegos, FZ
    Jiménez, AA
    Dávila, HIP
    International Conference on Computing, Communications and Control Technologies, Vol 5, Proceedings, 2004, : 27 - 31
  • [8] A NOTE ON COLORED PETRI NETS
    PETERSON, JL
    INFORMATION PROCESSING LETTERS, 1980, 11 (01) : 40 - 43
  • [9] HIERARCHIES IN COLORED PETRI NETS
    HUBER, P
    JENSEN, K
    SHAPIRO, RM
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 483 : 313 - 341
  • [10] ON THE INVARIANTS OF COLORED PETRI NETS
    NARAHARI, Y
    VISWANADHAM, N
    LECTURE NOTES IN COMPUTER SCIENCE, 1986, 222 : 330 - 345