Title :
Building survivable systems: an integrated approach based on intrusion detection and damage containment
Author :
Bowen, T. ; Chee, D. ; Segal, M. ; Sekar, R. ; Shanbhag, T. ; Uppuluri, P.
Author_Institution :
Telcordia Technol., Morristown, NJ, USA
fDate :
6/22/1905 12:00:00 AM
Abstract :
Reliance on networked information systems to support critical infrastructures prompts interest in making network information systems survivable, so that they continue functioning even when under attack. To build survivable systems, attacks must be detected and reacted to before they impact performance or functionality. Previous survivable systems research focused primarily on detecting intrusions, rather than on preventing or containing damage due to intrusions. We have therefore developed a new approach that combines early attack detection with automated reaction for damage prevention and containment, as well as tracing and isolation of attack origination point(s). Our approach is based on specifying security-relevant behaviors using patterns over sequences of observable events, such as a process´s system calls and their arguments, and the contents of network packets. By intercepting actual events at runtime and comparing them to specifications, attacks can be detected and operations associated with the deviant events can be modified to thwart the attack. Being based on security-relevant behaviors rather than known attack signatures, our approach can protect against unknown attacks. At the same time, our approach produces few false positives-a property that is critical for automating reactions. Our host-based mechanisms for attack detection and isolation coordinate with network routers enhanced with active networking technology in order to trace the origin of the attack and isolate the attacker
Keywords :
network operating systems; security of data; telecommunication network routing; telecommunication security; active networking; attack origination point; critical infrastructures; damage containment; early attack detection; host-based mechanisms; intrusion detection; network packets; network routers; networked information systems; runtime; security-relevant behavior; survivable systems; system calls; Art; Domain specific languages; Ear; Engines; Environmental management; Event detection; Intrusion detection; Monitoring; Protection; Runtime;
Conference_Titel :
DARPA Information Survivability Conference and Exposition, 2000. DISCEX '00. Proceedings
Conference_Location :
Hilton Head, SC
Print_ISBN :
0-7695-0490-6
DOI :
10.1109/DISCEX.2000.821511