Using Independent Auditors as Intrusion Detection Systems

  • Authors:
  • Jesus Molina;William A. Arbaugh

  • Affiliations:
  • -;-

  • Venue:
  • ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
  • Year:
  • 2002

Quantified Score

Hi-index 0.00

Visualization

Abstract

A basic method in computer security is to perform integrity checks on the file system to detect the installation of malicious programs, or the modification of sensitive files. Integrity tools to date rely on the operating system to function correctly, so once the operating system is compromised even a novice attacker can easily defeat these tools. A novel way to overcome this problem is the use of an independent auditor, which uses an out-of-band verification process that does not depend on the underlying operating system. In this paper we present a definition of independent auditors and a specific implementation of an independent auditor using an embedded system attached to the PCI bus.