Logo des Repositoriums
 

Using observations of invariant behaviour to detect malicious agency in distributes environments

dc.contributor.authorMcEvoy, Thomas Richard
dc.contributor.authorWolthusen, Stephen
dc.contributor.editorGöbel, Oliver
dc.contributor.editorFrings, Sandra
dc.contributor.editorGünther, Detlef
dc.contributor.editorNedon, Jens
dc.contributor.editorSchadt, Dirk
dc.date.accessioned2019-06-04T11:30:42Z
dc.date.available2019-06-04T11:30:42Z
dc.date.issued2008
dc.description.abstractDetecting malicious software used for covert ends is problematical because skilled attackers invariably employ stealth mechanisms to conceal the injection and subsequent activity of such software. As a result, the evidence of such incursions, frequently "disappears" once the attack has succeeded. In distributed environments, this difficulty is compounded because of the inherent difficulties in observing the global state of a computation. We propose a novel approach to the detection of potentially malicious activity in distributed environments. We select key data elements, which are chosen on the basis that they are frequently subject to subversion during malicious attacks. We specify their behavior as a partial order of sequences in state, accounting not only for legal and illegal states, but also for less than normative behavior, whose occurrence may indicate the presence of anomalous conditions. We show how we overcome the difficulties of observing state in distributed environments through employing a multiplicity of distinct and independent observer processes and by making use of well-known algorithms to synchronize and order our observations and we demonstrate that we are able to use the resulting data set to make inferences about the presence (or not) of malicious software based on comparisons of observed and expected behaviors.en
dc.identifier.isbn978-3-88579-234-5
dc.identifier.pissn1617-5468
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/23598
dc.language.isoen
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartofIMF 2008 – IT Incident Management & IT Forensics
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-140
dc.titleUsing observations of invariant behaviour to detect malicious agency in distributes environmentsen
dc.typeText/Conference Paper
gi.citation.endPage72
gi.citation.publisherPlaceBonn
gi.citation.startPage55
gi.conference.dateSeptember, 23-25, 2008
gi.conference.locationMannheim
gi.conference.sessiontitleRegular Research Papers

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
gi-proc-140-006.pdf
Größe:
167.31 KB
Format:
Adobe Portable Document Format