Building an Application Data Behavior Model for Intrusion Detection

  • Authors:
  • Olivier Sarrouy;Eric Totel;Bernard Jouga

  • Affiliations:
  • Supelec, Cesson-Sévigné CEDEX, France F-35576;Supelec, Cesson-Sévigné CEDEX, France F-35576;Supelec, Cesson-Sévigné CEDEX, France F-35576

  • Venue:
  • Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Application level intrusion detection systems usually rely on the immunological approach. In this approach, the application behavior is compared at runtime with a previously learned application profile of the sequence of system calls it is allowed to emit. Unfortunately, this approach cannot detect anything but control flow violation and thus remains helpless in detecting the attacks that aim pure application data. In this paper, we propose an approach that would enhance the detection of such attacks. Our proposal relies on a data oriented behavioral model that builds the application profile out of dynamically extracted invariant constraints on the application data items.