Fixed- vs. variable-length patterns for detecting suspicious process behavior

  • Authors:
  • Andreas Wespi;Hervé/ Debar;Marc Dacier;Mehdi Nassehi

  • Affiliations:
  • (Correspd. Tel.: +41 1 724 8624/ Fax: +41 1 724 8953/ E-mail: anw@zurich.ibm.com) IBM Research, Zurich Res. Lab., Sä/umerstrasse 4, CH-8803 Rü/schlikon, Switzerland E-mail&colon/ {anw,deb, ...;IBM Research, Zurich Research Laboratory, Sä/umerstrasse 4, CH-8803 Rü/schlikon, Switzerland E-mail&colon/ {anw,deb,dac,mmn}@zurich.ibm.com;IBM Research, Zurich Research Laboratory, Sä/umerstrasse 4, CH-8803 Rü/schlikon, Switzerland E-mail&colon/ {anw,deb,dac,mmn}@zurich.ibm.com;IBM Research, Zurich Research Laboratory, Sä/umerstrasse 4, CH-8803 Rü/schlikon, Switzerland E-mail&colon/ {anw,deb,dac,mmn}@zurich.ibm.com

  • Venue:
  • Journal of Computer Security
  • Year:
  • 2000

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper addresses the problem of creating patterns that can be used to model the normal behavior of a given process. The models can be used for intrusion-detection purposes. First, we present a novel method to generate input data sets that enable us to observe the normal behavior of a process in a secure environment. Second, we propose various techniques to derive either fixed-length or variable-length patterns from the input data sets. We show the advantages and drawbacks of each technique, based on the results of the experiments we have run on our testbed.