A Lightweight Host-Based Intrusion Detection based on Process Generation Patterns

被引:1
|
作者
Tsuda, Yu [1 ]
Nakazato, Junji [2 ]
Takagi, Yaichiro [1 ]
Inoue, Daisuke [1 ]
Nakao, Koji [1 ]
Terada, Kenjiro [1 ]
机构
[1] Natl Inst Informat & Commun Technol, Tokyo, Japan
[2] FUJITSU LABS LTD, Kawasaki, Kanagawa, Japan
关键词
D O I
10.1109/AsiaJCIS.2018.00025
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advanced persistent threat (APT) has been considered globally as a serious social problem since the 2010s. Adversaries of this threat, at first, try to penetrate into targeting organizations by using a backdoor which is opened with drive-by-download attacks, malicious e-mail attachments, etc. After adversaries' intruding, they usually execute benign applications (e.g, OS built-in commands, management tools published by OS vendors, etc.) for investigating networks of targeting organizations. Therefore, if they penetrate into networks once, it is difficult to rapidly detect these malicious activities only by using anti-virus software or network-based intrusion systems. Meanwhile, enterprise networks are managed well in general. That means network administrators have a good grasp of installed applications and routinely used applications for employees' daily works. Thereby, in order to find anomaly behaviors on well-managed networks, it is effective to observe changes executing their applications. In this paper, we propose a lightweight host-based intrusion detection system by using process generation patterns. Our system periodically collects lists of active processes from each host, then the system constructs process trees from the lists. In addition, the system detects anomaly processes from the process trees considering parent-child relationships, execution sequences and lifetime of processes. Moreover, we evaluated the system in our organization. The system collected 2, 403, 230 process paths in total from 498 hosts for two months, then the system could extract 38 anomaly processes. Among them, one PowerShell process was also detected by using an anti-virus software running on our organization. Furthermore, our system could filter out the other 18 PowerShell processes, which were used for maintenance of our network.
引用
收藏
页码:102 / 108
页数:7
相关论文
共 50 条
  • [31] Host-based intrusion detection using dynamic and static behavioral models
    Yeung, DY
    Ding, YX
    PATTERN RECOGNITION, 2003, 36 (01) : 229 - 243
  • [32] Trust Management and Admission Control for Host-Based Collaborative Intrusion Detection
    Carol Fung
    Jie Zhang
    Issam Aib
    Raouf Boutaba
    Journal of Network and Systems Management, 2011, 19 : 257 - 277
  • [33] Host-based intrusion detection with multi-datasource and deep learning
    Hwang, Ren-Hung
    Lee, Chieh-Lun
    Lin, Ying-Dar
    Lin, Po-Chin
    Wu, Hsiao-Kuang
    Lai, Yuan-Cheng
    Chen, C. K.
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 78
  • [34] On effective sampling techniques in host-based intrusion detection in tactical MANET
    Yu, Wei
    Ge, Linqiang
    Zhang, Difan
    Hardy, Rommie L.
    Reschly, Robert J.
    International Journal of Security and Networks, 2013, 8 (03) : 154 - 168
  • [35] A Unified Host-based Intrusion Detection Framework using Spark in Cloud
    Liu, Ming
    Xue, Zhi
    He, Xiangjian
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 97 - 103
  • [36] Trust Management and Admission Control for Host-Based Collaborative Intrusion Detection
    Fung, Carol
    Zhang, Jie
    Aib, Issam
    Boutaba, Raouf
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2011, 19 (02) : 257 - 277
  • [37] Bluebox: A policy-driven, host-based intrusion detection system
    Chari, Suresh N.
    Cheng, Pau-Chen
    ACM Transactions on Information and System Security, 2003, 6 (02) : 173 - 200
  • [38] An Autonomous Host-Based Intrusion Detection System for Android Mobile Devices
    Ribeiro, Jose
    Saghezchi, Firooz B.
    Mantas, Georgios
    Rodriguez, Jonathan
    Shepherd, Simon J.
    Abd-Alhameed, Raed A.
    MOBILE NETWORKS & APPLICATIONS, 2020, 25 (01): : 164 - 172
  • [39] An Autonomous Host-Based Intrusion Detection System for Android Mobile Devices
    José Ribeiro
    Firooz B. Saghezchi
    Georgios Mantas
    Jonathan Rodriguez
    Simon J. Shepherd
    Raed A. Abd-Alhameed
    Mobile Networks and Applications, 2020, 25 : 164 - 172
  • [40] A network audit system for host-based intrusion detection (NASHID) in linux
    Daniels, TE
    Spafford, EH
    16TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2000, : 178 - 187