Evaluation of Control Flow Traces in Software Applications for Intrusion Detection

Gul, Imran Asad, Sommer, Nils, Rohr, Matthias, van Hoorn, André and Hasselbring, Wilhelm (2008) Evaluation of Control Flow Traces in Software Applications for Intrusion Detection [Paper] In: 12th IEEE International Multitopic Conference (INMIC 2008), December 23--24, 2008, Karachi, Pakistan.

[img]
Preview
Text
GulSommerRohrVanHoornHasselbring2008EvaluationOfControlFlowTracesInSoftwareApplicationsForIntrusionDetection-cameryReady-stamped-finalPageNumbers.pdf - Accepted Version

Download (661Kb) | Preview

Abstract

Software security has become an important requirement, particularly for systems that are publicly accessible through the Internet. Such systems can be equipped with intrusion detection systems to uncover security breaches. In this paper, we present a novel application-level intrusion detection approach. A normal behavior profile is created from application-internal control flow in terms of operation execution traces. Anomalous control flows indicative for intrusion attempts are detected by continuously monitoring and analyzing the software system. A case study demonstrates the intrusion detection approach's applicability in the context of a multi-user Java Web application.

Document Type: Conference or Workshop Item (Paper)
Research affiliation: Kiel University > Faculty of Engineering > Department of Computer Science > Software Engineering
Projects: Kieker
Date Deposited: 18 Feb 2012 06:05
Last Modified: 13 Jun 2013 20:34
URI: http://eprints.uni-kiel.de/id/eprint/14478

Actions (login required)

View Item View Item

Document Downloads

More statistics for this item...