Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based Behavioral Dista
#1

Presented By:
Debin Gao, Michael K. Reiter, Senior Member, IEEE Computer Society, and Dawn Song

Abstract—
Many host-based anomaly detection techniques have been proposed to detect code-injection attacks on servers. The vast majority, however, are susceptible to “mimicry” attacks in which the injected code masquerades as the original server software,including returning the correct service responses, while conducting its attack. “Behavioral distance,” by which two diverse replicas processing the same inputs are continually monitored to detect divergence in their low-level (system-call) behaviors and hence potentially the compromise of one of them, has been proposed for detecting mimicry attacks. In this paper, we present a novel approach to behavioral distance measurement using a new type of Hidden Markov Model, and present an architecture realizing this new approach. We evaluate the detection capability of this approach using synthetic workloads and recorded workloads of production web and game servers, and show that it detects intrusions with substantially greater accuracy than a prior proposal on using behavioral distance. We also detail the design and implementation of a new architecture, which takes advantage of vitalization to measure behavioral distance. We apply our architecture to implement intrusion-tolerant web and game servers, and through trace-driven simulations demonstrate that it experiences moderate performance costs even when thresholds are set to detect stealthy mimicry attacks.Index Terms—Intrusion detection, replicated system, output voting, system call, behavioral distance.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: behavioral question, ad hoc networks beyond unit disk graphs, cellular technology beyond 3g that is 4g, rosenbaum beyond college for, www bedbathand beyond, human activity recognition using hmm in matlab code, behavioral based interview questions,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based Behavioral Dista - by project topics - 18-04-2011, 12:13 PM

Possibly Related Threads...
Thread Author Replies Views Last Post
  WEB SERVICE SELECTION BASED ON RANKING OF QOS USING ASSOCIATIVE CLASSIFICATION 1 943 15-02-2017, 04:13 PM
Last Post: jaseela123d
  A Search Engine Using Case Based Reasoning nit_cal 1 1,632 21-12-2012, 11:01 AM
Last Post: seminar details
  Online Voting System seminar topics 27 34,922 14-12-2012, 02:00 PM
Last Post: seminar details
  ONLINE VOTING SYSTEM EMPLOYING BIOMETRICS seminar class 3 3,970 21-11-2012, 01:05 PM
Last Post: seminar details
  Input/output device’s smart paper boy 1 2,188 22-10-2012, 12:56 PM
Last Post: seminar details
  CBIR - Content Based Image Retrieval Using Shape & Color Characteristics seminar class 1 2,823 19-10-2012, 01:08 PM
Last Post: seminar details
  WATERMARKING RELATIONAL DATABASES USING OPTIMIZATION-BASED TECHNIQUES electronics seminars 9 8,855 14-02-2012, 03:48 PM
Last Post: seminar paper
  Detecting malicious packet losses computer science topics 4 4,827 07-02-2012, 01:08 PM
Last Post: seminar addict
  Detecting Spam Zombies by Monitoring Outgoing Messages Projects9 0 1,491 20-01-2012, 06:14 PM
Last Post: Projects9
  A DWT BASED APPROACH FOR STEGANOGRAPHY USING BIOMETRICS project topics 3 2,871 10-10-2011, 09:55 AM
Last Post: seminar addict

Forum Jump: