2006 IEEE Symposium on Security and Privacy (S&P'06) 2006
DOI: 10.1109/sp.2006.12
|View full text |Cite
|
Sign up to set email alerts
|

Dataflow anomaly detection

Abstract: Beginning with the work of Forrest et al, several researchers have developed intrusion detection techniques based on modeling program behaviors in terms of system calls. A weakness of these techniques is that they focus on control flows involving system calls, but not their arguments. This weakness makes them susceptible to several classes of attacks, including attacks on security-critical data, race-condition and symbolic link attacks, and mimicry attacks. To address this weakness, we develop a new approach f… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
95
0

Year Published

2006
2006
2018
2018

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 100 publications
(96 citation statements)
references
References 18 publications
1
95
0
Order By: Relevance
“…to be more precise of dynamic learning-based techniques, is that they are able to automatically infer security policies by observing and characterizing applications' events, as successfully shown in recent and past research efforts [37,35,9,15,29,21,20,2]. For instance, sequences of system calls can be used as a starting point to define a possible behavior of an application [15], statistical models can help to characterize system calls arguments usage [21,20], and machine learning techniques can be adopted to infer relationships among the arguments of different system calls [2].…”
Section: Introductionmentioning
confidence: 95%
See 4 more Smart Citations
“…to be more precise of dynamic learning-based techniques, is that they are able to automatically infer security policies by observing and characterizing applications' events, as successfully shown in recent and past research efforts [37,35,9,15,29,21,20,2]. For instance, sequences of system calls can be used as a starting point to define a possible behavior of an application [15], statistical models can help to characterize system calls arguments usage [21,20], and machine learning techniques can be adopted to infer relationships among the arguments of different system calls [2].…”
Section: Introductionmentioning
confidence: 95%
“…As other approaches [2,29,21], our analysis is context-sensitive. That is, it considers contexts for each system call that can be utilized to refine argument learning.…”
Section: Anomalous Taint Detectionmentioning
confidence: 99%
See 3 more Smart Citations