Customized normalcy profiles for the detection of targeted attacks

0Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Functionality is the highest semantic level of the software behavior pyramid that reflects goals of the software rather than its specific implementation. Detection of malicious functionalities presents an effective way to detect malware in behavior-based IDS. A technology for mining system call data, discussed herein, results in the detection of functionalities representing operation of legitimate software within a closed network environment. The set of such functionalities combined with the frequencies of their execution constitutes a normalcy profile typical for this environment. Detection of deviations from this normalcy profile, new functionalities and/or changes in the execution frequencies, provides evidence of abnormal activity in the network caused by malware. This approach could be especially valuable for the detection of targeted zero-day attacks. The paper presents the results of the implementation and testing of the described technology on the computer network testbed. © 2012 Springer-Verlag.

Cite

CITATION STYLE

APA

Skormin, V., Nykodym, T., Dolgikh, A., & Antonakos, J. (2012). Customized normalcy profiles for the detection of targeted attacks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7248 LNCS, pp. 487–496). https://doi.org/10.1007/978-3-642-29178-4_49

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free