State transition analysis to detect malicious program behavior

  • Authors:
  • Xin Tang;Constantine Manikopoulos;Sotirios G. Ziavras

  • Affiliations:
  • Electrical and Computer Engineering Department, New Jersey Institute of Technology, Newark, NJ;Electrical and Computer Engineering Department, New Jersey Institute of Technology, Newark, NJ;Electrical and Computer Engineering Department, New Jersey Institute of Technology, Newark, NJ

  • Venue:
  • ICCOMP'08 Proceedings of the 12th WSEAS international conference on Computers
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we present a new method to detect malicious program behavior in general based on computer audit data. Ilgun, et al. have proposed USTAT (State Transition Analysis Tool for UNIX), a rule-based state transition analysis approach to solve this problem. Also, Hofmeyr and Forrest have used the N-grams method to classify program behavior traces. Here we propose an improved method that uses state transition probabilities to classify audit data. This method is more flexible and dynamic, and could be applied to a wider range of data.