Skip to main content

On gray-box program tracking for anomaly detection

Publication ,  Conference
Gao, D; Reiter, MK; Song, D
Published in: Proceedings of the 13th USENIX Security Symposium
January 1, 2004

Many host-based anomaly detection systems monitor a process ostensibly running a known program by observing the system calls the process makes. Numerous improvements to the precision of this approach have been proposed, such as tracking system call sequences, and various "gray-box" extensions such as examining the program counter or return addresses on the stack when system calls are made. In this paper, we perform the first systematic study of a wide spectrum of such methods. We show that prior approaches can be organized along three axes, revealing new possibilities for system-call-based program tracking. Through an empirical analysis of this design space, we shed light on the benefits and costs of various points in the space and identify new regions that appear to outperform prior approaches. In separate contributions, we demonstrate novel mimicry attacks on a recent proposal using return addresses for system-call-based program tracking, and then suggest randomization techniques to make such attacks more difficult.

Duke Scholars

Published In

Proceedings of the 13th USENIX Security Symposium

Publication Date

January 1, 2004
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Gao, D., Reiter, M. K., & Song, D. (2004). On gray-box program tracking for anomaly detection. In Proceedings of the 13th USENIX Security Symposium.
Gao, D., M. K. Reiter, and D. Song. “On gray-box program tracking for anomaly detection.” In Proceedings of the 13th USENIX Security Symposium, 2004.
Gao D, Reiter MK, Song D. On gray-box program tracking for anomaly detection. In: Proceedings of the 13th USENIX Security Symposium. 2004.
Gao, D., et al. “On gray-box program tracking for anomaly detection.” Proceedings of the 13th USENIX Security Symposium, 2004.
Gao D, Reiter MK, Song D. On gray-box program tracking for anomaly detection. Proceedings of the 13th USENIX Security Symposium. 2004.

Published In

Proceedings of the 13th USENIX Security Symposium

Publication Date

January 1, 2004