Show simple item record

dc.contributor.authorZhang, Tao
dc.contributor.authorZhuang, Xiaotong
dc.contributor.authorPande, Santosh
dc.contributor.authorLee, Wenke
dc.date.accessioned2004-08-11T19:12:21Z
dc.date.available2004-08-11T19:12:21Z
dc.date.issued2004-03-10
dc.identifier.urihttp://hdl.handle.net/1853/96
dc.description.abstractModern computer systems are plagued with security flaws, making them vulnerable to various malicious attacks. Intrusion detection systems have been proposed to protect computer systems from unauthorized penetration. Detecting an attack early on pays off since further damage is avoided and resilient recovery could be adopted. An intrusion detection system monitors dynamic program behavior against normal program behavior and raises an alert when anomaly is detected. The normal behaviour is learnt by the system through training and profiling. However, all current intrusion detection systems are purely software based and thus suffer from huge performance degradation due to constant monitoring operations inserted in the application code. Due to the potential performance overhead, software based solutions cannot monitor the program behavior at a very fine level of granularity, thus leaving potential security holes as shown in [5]. In this paper, we propose a hardware-based approach to verify the control flow of target applications dynamically and to detect anomalous executions. With hardware support, our approach offers multiple advantages over software based solutions including near zero performance degradation, much stronger detection capability (a larger variety of attacks get detected) and zero-latency reaction upon anomaly and thus much better security.en
dc.format.extent303736 bytes
dc.format.mimetypeapplication/pdf
dc.language.isoen_US
dc.publisherGeorgia Institute of Technology
dc.relation.ispartofseriesCERCS;GIT-CERCS-04-11
dc.subjectBehavior monitoring
dc.subjectHardware based solutions
dc.subjectIntrusion Detection Systems (IDS)
dc.subjectMalicious attacks
dc.subjectProfiling
dc.subjectSecurity
dc.subjectZero performance degradation
dc.titleHardware Supported Anomaly Detection: down to the Control Flow Levelen
dc.typeText
dc.type.genreTechnical Report


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record