Efficient context-sensitive intrusion detection based on state transition table

Jingyu Hua, Mingchu Li, Yizhi Ren, Kouichi Sakurai

Research output: Contribution to journalArticlepeer-review

Abstract

Those host-based intrusion detection models like VPStatic first construct a model of acceptable behaviors for each monitored program via static analysis, and then perform intrusion detection by comparing them with programs' runtime behaviors. These models usually share the highly desirable feature that they do not produce false alarms but face the conflicts between accuracy and efficiency. For instance, the high accuracy of the VP- Static model is at the cost of high space complexity. In this paper, we use a statically-constructed state transition table (SiT), which records expected transitions among system calls as well as their stack states (return address lists), as a behavior model to perform context-sensitive intrusion detection. According to our analysis, our STE model improves the space efficiency of the VPStatic model without decreasing its high precision and time effi ciency. Experiments show that for three test programs, memory uses of our STE models are all much less than half of the VPStatic models'. Thereby, we alleviate the conflicts between the accuracy and the efficiency.

Original languageEnglish
Pages (from-to)255-264
Number of pages10
JournalIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
VolumeE94-A
Issue number1
DOIs
Publication statusPublished - Jan 2011

All Science Journal Classification (ASJC) codes

  • Signal Processing
  • Computer Graphics and Computer-Aided Design
  • Electrical and Electronic Engineering
  • Applied Mathematics

Fingerprint Dive into the research topics of 'Efficient context-sensitive intrusion detection based on state transition table'. Together they form a unique fingerprint.

Cite this