Gul, Imran Asad, Sommer, Nils, Rohr, Matthias, van Hoorn, André and Hasselbring, Wilhelm (2008) Evaluation of Control Flow Traces in Software Applications for Intrusion Detection [Paper] In: 12th IEEE International Multitopic Conference (INMIC 2008), December 23--24, 2008, Karachi, Pakistan.
GulSommerRohrVanHoornHasselbring2008EvaluationOfControlFlowTracesInSoftwareApplicationsForIntrusionDetection-cameryReady-stamped-finalPageNumbers.pdf - Accepted Version
Download (661Kb) | Preview
Software security has become an important requirement, particularly for systems that are publicly accessible through the Internet. Such systems can be equipped with intrusion detection systems to uncover security breaches. In this paper, we present a novel application-level intrusion detection approach. A normal behavior profile is created from application-internal control flow in terms of operation execution traces. Anomalous control flows indicative for intrusion attempts are detected by continuously monitoring and analyzing the software system. A case study demonstrates the intrusion detection approach's applicability in the context of a multi-user Java Web application.
|Document Type:||Conference or Workshop Item (Paper)|
|Research affiliation:||Kiel University > Faculty of Engineering > Department of Computer Science > Software Engineering|
|Date Deposited:||18 Feb 2012 06:05|
|Last Modified:||13 Jun 2013 20:34|
Actions (login required)