Anatomy of a Real-Time Intrusion Prevention System

Ricardo Koller, R. Rangaswami, J. Marrero, Igor Hernandez, Geoffrey Smith, Mandy Barsilai, Silviu Necula, S. M. Sadjadi, Tao Li, Krista Merrill
{"title":"Anatomy of a Real-Time Intrusion Prevention System","authors":"Ricardo Koller, R. Rangaswami, J. Marrero, Igor Hernandez, Geoffrey Smith, Mandy Barsilai, Silviu Necula, S. M. Sadjadi, Tao Li, Krista Merrill","doi":"10.1109/ICAC.2008.24","DOIUrl":null,"url":null,"abstract":"Host intrusion prevention systems for both servers and end-hosts must address the dual challenges of accuracy and performance. Researchers have mostly focused on addressing the former challenge, suggesting solutions based either on exploit- based penetration detection or anomaly-based misbehavior detection, but yet stopping short of comprehensive solutions that leverage merits of both approaches. The second challenge, however, is rarely addressed; doing so comprehensively is important since these systems can introduce substantial overhead and cause system slowdown, more so when the system load is high. We present Rootsense, a holistic and real-time intrusion prevention system that combines the merits of misbehavior- based and anomaly-based detection. Four principles govern the design and implementation of Rootsense. First, Rootsense audits events within different subsystems of the host operating system and correlates them to comprehensively capture the global system state. Second, Rootsense restricts the detection domain to root compromises only; doing so reduces run-time overhead and increases detection accuracy (root behavior is more easily modeled than user behavior). Third, Rootsense adopts a dual approach to intrusion detection - a root penetration detector detects activities that exploit system vulnerabilities to penetrate the security perimeter, and a root misbehavior detector tracks misbehavior by root processes. Fourth, Rootsense is designed to be configurable for overhead management allowing the system administrator to tune the overhead characteristics of the intrusion prevention system that affect foreground task performance. A Linux implementation of Rootsense is analyzed for both accuracy and performance, using several real-world exploits and a range of end-host and server benchmarks.","PeriodicalId":436716,"journal":{"name":"2008 International Conference on Autonomic Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"30","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 International Conference on Autonomic Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAC.2008.24","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 30

Abstract

Host intrusion prevention systems for both servers and end-hosts must address the dual challenges of accuracy and performance. Researchers have mostly focused on addressing the former challenge, suggesting solutions based either on exploit- based penetration detection or anomaly-based misbehavior detection, but yet stopping short of comprehensive solutions that leverage merits of both approaches. The second challenge, however, is rarely addressed; doing so comprehensively is important since these systems can introduce substantial overhead and cause system slowdown, more so when the system load is high. We present Rootsense, a holistic and real-time intrusion prevention system that combines the merits of misbehavior- based and anomaly-based detection. Four principles govern the design and implementation of Rootsense. First, Rootsense audits events within different subsystems of the host operating system and correlates them to comprehensively capture the global system state. Second, Rootsense restricts the detection domain to root compromises only; doing so reduces run-time overhead and increases detection accuracy (root behavior is more easily modeled than user behavior). Third, Rootsense adopts a dual approach to intrusion detection - a root penetration detector detects activities that exploit system vulnerabilities to penetrate the security perimeter, and a root misbehavior detector tracks misbehavior by root processes. Fourth, Rootsense is designed to be configurable for overhead management allowing the system administrator to tune the overhead characteristics of the intrusion prevention system that affect foreground task performance. A Linux implementation of Rootsense is analyzed for both accuracy and performance, using several real-world exploits and a range of end-host and server benchmarks.
实时入侵防御系统的剖析
针对服务器和终端主机的主机入侵防御系统必须解决准确性和性能的双重挑战。研究人员主要集中在解决前一个挑战,提出基于基于漏洞的渗透检测或基于异常的不当行为检测的解决方案,但还没有综合利用这两种方法的优点的解决方案。然而,第二个挑战很少得到解决;全面这样做是很重要的,因为这些系统可能会带来大量的开销并导致系统减速,当系统负载很高时更是如此。我们提出了Rootsense,一个整体和实时入侵防御系统,结合了基于错误行为和基于异常的检测的优点。Rootsense的设计和实现遵循四个原则。首先,Rootsense审计主机操作系统的不同子系统中的事件,并将它们关联起来,以全面捕获全局系统状态。其次,Rootsense仅将检测域限制为根威胁;这样做可以减少运行时开销并提高检测准确性(根行为比用户行为更容易建模)。第三,Rootsense采用双重方法进行入侵检测——根渗透检测器检测利用系统漏洞渗透安全边界的活动,根不当行为检测器跟踪根进程的不当行为。第四,Rootsense被设计为可配置的开销管理,允许系统管理员调整影响前台任务性能的入侵防御系统的开销特征。本文分析了Rootsense的Linux实现的准确性和性能,使用了几个真实世界的漏洞和一系列终端主机和服务器基准测试。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信