Visible to the public A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns

TitleA Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns
Publication TypeJournal Article
Year of Publication2014
AuthorsCreech, G., Jiankun Hu
JournalComputers, IEEE Transactions on
Volume63
Pagination807-819
Date PublishedApril
ISSN0018-9340
KeywordsADFA-LD, anomaly detection, Clocks, Complexity theory, Computer architecture, computer security, contemporary hacking methods, contiguous system call patterns, cryptography, discontiguous system call patterns, false alarm rates, Gaussian processes, high level languages, high-level programming languages, host-based anomaly intrusion detection system design, host-based IDS, Intrusion detection, KDD98 data sets, Logic gates, modern operating system, operating systems (computers), program anomaly behaviour, Registers, security of data, semantic structure, system calls, UNM data sets
Abstract

Host-based anomaly intrusion detection system design is very challenging due to the notoriously high false alarm rate. This paper introduces a new host-based anomaly intrusion detection methodology using discontiguous system call patterns, in an attempt to increase detection rates whilst reducing false alarm rates. The key concept is to apply a semantic structure to kernel level system calls in order to reflect intrinsic activities hidden in high-level programming languages, which can help understand program anomaly behaviour. Excellent results were demonstrated using a variety of decision engines, evaluating the KDD98 and UNM data sets, and a new, modern data set. The ADFA Linux data set was created as part of this research using a modern operating system and contemporary hacking methods, and is now publicly available. Furthermore, the new semantic method possesses an inherent resilience to mimicry attacks, and demonstrated a high level of portability between different operating system versions.

DOI10.1109/TC.2013.13
Citation Key6419701