Free Academic Seminars And Projects Reports
Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based Behavioral Dist - Printable Version

+- Free Academic Seminars And Projects Reports (https://easyreport.in)
+-- Forum: Project Ideas And Disscussion (https://easyreport.in/forumdisplay.php?fid=32)
+--- Forum: Engineering Project Ideas (https://easyreport.in/forumdisplay.php?fid=33)
+---- Forum: Computer Science Project Ideas (https://easyreport.in/forumdisplay.php?fid=36)
+---- Thread: Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based Behavioral Dist (/showthread.php?tid=47456)



Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based Behavioral Dist - musadhiqkahn - 10-04-2017

Presented By:
Debin Gao, Michael K. Reiter, Senior Member, IEE Computer Society, and Dawn Song

Abstract
Many host-based anomaly detection techniques have been proposed to detect code-injection attacks on servers. The vast majority, however, are susceptible to mimicry attacks in which the injected code masquerades as the original server software,including returning the correct service responses, while conducting its attack. Behavioral distance, by which two diverse replicas processing the same inputs are continually monitored to detect divergence in their low-level (system-call) behaviors and hence potentially the compromise of one of them, has been proposed for detecting mimicry attacks. In this paper, we present a novel approach to behavioral distance measurement using a new type of Hidden Markov Model, and present an architecture realizing this new approach. We evaluate the detection capability of this approach using synthetic workloads and recorded workloads of production web and game servers, and show that it detects intrusions with substantially greater accuracy than a prior proposal on using behavioral distance. We also detail the design and implementation of a new architecture, which takes advantage of vitalization to measure behavioral distance. We apply our architecture to implement intrusion-tolerant web and game servers, and through trace-driven simulations demonstrate that it experiences moderate performance costs even when thresholds are set to detect stealthy mimicry attacks.Index Terms Intrusion detection, replicated system, output voting, system call, behavioral distance.


Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based Behavioral Dist - farhath - 10-04-2017

Abstract :-
Many host-based anomaly detection techniques have been proposed to detect code-injection attacks on servers. The vastmajority, however, are susceptible to mimicry attacks in which the injected code masquerades as the original server software,including returning the correct service responses, while conducting its attack. Behavioral distance, by which two diverse replicasprocessing the same inputs are continually monitored to detect divergence in their low-level (system-call) behaviors and hencepotentially the compromise of one of them, has been proposed for detecting mimicry attacks. In this paper, we present a novelapproach to behavioral distance measurement using a new type of Hidden Markov Model, and present an architecture realizing thisnew approach. We evaluate the detection capability of this approach using synthetic workloads and recorded workloads of productionweb and game servers, and show that it detects intrusions with substantially greater accuracy than a prior proposal on uringbehavioral distance. We also detail the design and implementation of a new architecture, which takes advantage of virtualization tomeasure behavioral distance. We apply our architecture to implement intrusion-tolerant web and game servers, and throughtrace-driven simulations demonstrate that it experiences moderate performance costs even when thresholds are set to detect stealthymimicry attacks.Index Terms Intrusion detection, replicated system, output voting, system call, behavioral distance.