Host based attack detection using system calls

  • Authors:
  • Jestin Joy;Anita John

  • Affiliations:
  • Federal Institute of Science and Technology, Cochin, Kerala, India;Rajagiri School of Engineering and Technology, Cochin, Kerala, India

  • Venue:
  • Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

As the dependence on network increased for accessing information, attackers targeted it for extracting information. Securing information in a networked environment became a challenge. Security systems can be employed in the host or in the network itself as a standalone entity. Host based detection systems can be broadly classified into either anomaly detection or misuse detection. Host based methods are more popular due to the low, cost and processing overhead involved, as compared to other mechanisms like virtualisation based detection. Due to its effectiveness, attackers now manipulate system calls for initiating an attack. Rootkits are the best example of these type of attacks. Kernel level rootkits manipulate system calls by different means to hide its existence. We used host based detection mechanism, where a Linux kernel module is used to extract information from the kernel. Our work proposes an efficient host based detection mechanism using unsupervised learning mechanism in a Linux based system.