کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
425821 685921 2016 11 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Unifying intrusion detection and forensic analysis via provenance awareness
ترجمه فارسی عنوان
تلفیق تشخیص نفوذ و تجزیه و تحلیل قانونی از طریق آگاهی از منشأ
کلمات کلیدی
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر نظریه محاسباتی و ریاضیات
چکیده انگلیسی


• We design and implement a provenance-aware intrusion detection and analysis system.
• PIDAS integrates both online intrusion detection with offline forensic analysis.
• PIDAS has high detection rate with low false alarm rate.
• PIDAS can explicitly mark out system vulnerabilities or intrusion sources.

The existing host-based intrusion detection methods are mainly based on recording and analyzing the system calls of the invasion processes (such as exploring the sequences of system calls and their occurring probabilities). However, these methods are not efficient enough on the detection precision as they do not reveal the inherent intrusion events in detail (e.g., where are the system vulnerabilities and what causes the invasion are both not mentioned). On the other hand, though the log-based forensic analysis can enhance the understanding of how these invasion processes break into the system and what files are affected by them, it is a very cumbersome process to manually acquire information from logs which consist of the users’ normal behavior and intruders’ illegal behavior together.This paper proposes to use provenance, the history or lineage of an object that explicitly represents the dependency relationship between the damaged files and the intrusion processes, rather than the underlying system calls, to detect and analyze intrusions. Provenance more accurately reveals and records the data and control flow between files and processes, reducing the potential false alarm caused by system call sequences. Moreover, the warning report during intrusion can explicitly output system vulnerabilities and intrusion sources, and provide detection points for further provenance graph based forensic analysis. Experimental results show that this framework can identify the intrusion with high detection rate, lower false alarm rate, and smaller detection time overhead compared to traditional system call based method. In addition, it can analyze the system vulnerabilities and attack sources quickly and accurately.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Future Generation Computer Systems - Volume 61, August 2016, Pages 26–36
نویسندگان
, , , ,