Efficient Intrusion Detection Based on Static Analysis and Stack Walks

  • Authors:
  • Jingyu Hua;Mingchu Li;Kouichi Sakurai;Yizhi Ren

  • Affiliations:
  • School of Software, Dalian University of Technology, Dalian, China 116620;School of Software, Dalian University of Technology, Dalian, China 116620;Dept.of Computer Science and Communication Engineering, kyushu University, Fukuoka, Japan 812-0053;School of Software, Dalian University of Technology, Dalian, China 116620 and Dept.of Computer Science and Communication Engineering, kyushu University, Fukuoka, Japan 812-0053

  • Venue:
  • IWSEC '09 Proceedings of the 4th International Workshop on Security: Advances in Information and Computer Security
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Some intrusion detection models such as the VPStatic first construct a behavior model for a program via static analysis, and then perform intrusion detection by monitoring whether its execution is consistent with this behavior model. These models usually share the highly desirable feature that they do not produce false alarms but they face the conflict between precision and efficiency. The high precision of the VPStatic is at the cost of high space complexity. In this paper, we propose a new context-sensitive intrusion detection model based on static analysis and stack walks, which is similar to VPStatic but much more efficient, especially in memory use. We replace the automaton in the VPStatic with a state transition table (STT) and all redundant states and transitions in VPStatic are eliminated. We prove that our STT model is a deterministic pushdown automaton (DPDA) and the precision is the same as the VPStatic. Experiments also demonstrate that our STT model reduces both time and memory costs comparing with the VPStatic, in particular, memory overheads are less than half of the VPStatic's. Thereby, we alleviate the conflict between precision and efficiency.