Colored Petri Nets as the Enabling Technology in Intrusion Detection Systems

被引:0
|
作者
Dolgikh, A. [1 ]
Nykodym, T. [1 ]
Skormin, V. [1 ]
Antonakos, J. [2 ]
Baimukhamedov, M. [3 ]
机构
[1] SUNY Binghamton, Binghamton, NY 13902 USA
[2] SUNY Broome Community Coll, Binghamton, NY 13901 USA
[3] Kostanai Tech Univ, Kostanai, Kazakhstan
关键词
behavior based IDS; Colored Petri Net; functionality detection; behavior detection;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Behavior based intrusion detection technologies are increasingly popular. Traditionally behavior patterns are expressed as specific signatures defined in the system call domain. This approach has various drawbacks and is vulnerable to possible obfuscations. The IDS approach discussed herein addresses process behavior in terms of functionalities, i.e. particular process objectives. The functionalities are formalized in the form that is independent of their specific realizations and is obfuscation resistant. The malware is detected by particular sets of functionalities exposed by programs during their execution. The approach implies the selection of common malicious functionalities, followed by formal description of these functionalities via specific system call combinations. In the detection domain, monitored system calls are combined into API functions utilizing Colored Petri nets (CPN). After that API functions are combined into malicious functionalities, indicative of malware attack, also using CPN. The advantages of CPN utilization for dynamic code analysis are described. By its nature the described approach is signature-based. The CPN technology is the backbone of the described approach: CPNs are used to define the functionalities of interests as behavior signatures, and at the same time serve as the mechanism for the signature detection. The paper describes a unique general-purpose software tool implementing CPN. It constitutes the enabling technology for the described IDS approach, and has many additional applications for modeling and monitoring complex hierarchical systems of discrete events.
引用
收藏
页码:1297 / 1301
页数:5
相关论文
共 50 条