Provenance-based Intrusion Detection: Opportunities and Challenges

06/04/2018
by   Xueyuan Han, et al.
0

Intrusion detection is an arms race; attackers evade intrusion detection systems by developing new attack vectors to sidestep known defense mechanisms. Provenance provides a detailed, structured history of the interactions of digital objects within a system. It is ideal for intrusion detection, because it offers a holistic, attack-vector-agnostic view of system execution. As such, provenance graph analysis fundamentally strengthens detection robustness. We discuss the opportunities and challenges associated with provenance-based intrusion detection and provide insights based on our experience building such systems.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/29/2023

Exploring placement of intrusion detection systems in rpl-based internet of things

Intrusion detection is an indispensable part of RPL security due to its ...
research
07/22/2009

Self-adaptive web intrusion detection system

The evolution of the web server contents and the emergence of new kinds ...
research
01/29/2020

Intrusion Detection using ASTDs

In this paper, we show the application of ASTDs to intrusion detection. ...
research
09/17/2019

Walling up Backdoors in Intrusion Detection Systems

Interest in poisoning attacks and backdoors recently resurfaced for Deep...
research
09/18/2019

Analyzing Root Causes of Intrusion Detection False-Negatives: Methodology and Case Study

Intrusion Detection Systems (IDSs) are a necessary cyber defense mechani...
research
08/18/2018

Runtime Analysis of Whole-System Provenance

Identifying the root cause and impact of a system intrusion remains a fo...
research
09/26/2009

Hybrid Intrusion Detection and Prediction multiAgent System HIDPAS

This paper proposes an intrusion detection and prediction system based o...

Please sign up or login with your details

Forgot password? Click here to reset