100 likes | 260 Views
Colored Petri nets as the enabling technology in Intrusion Detection Systems. Andrey M. Dolgikh MS in Computer Engineering Degree and Specialization Sought: Doctor of Philosophy in Electrical & Computer Engineering. Conventional antivirus. Signature database. Program _____. Match.
E N D
Colored Petri nets as the enabling technology in Intrusion Detection Systems Andrey M. Dolgikh MS in Computer Engineering Degree and Specialization Sought: Doctor of Philosophy in Electrical & Computer Engineering
Conventional antivirus Signature database Program _____ Match Virus Perfect match – virus detected
Part of program Virus body detected B R A K E I T Signature B R A K E I T
Part of program B R a K E i T Signature B R A K E I T
Utilization of binary signatures (source: Kaspersky Lab) • Current IDS depend on ever-growing databases of binary signatures
Utilization of Malicious functionalities (source: Trend Micro Inc.) 2007 2008 2009
Understanding behavior • Sentence: • Send the password to the Internet • Words: • Password, Internet, The, Send, To • Letters: • PasswordInternetTheSendTo
In natural language Behavior User mode MS Excel: Do something useful Virus MS Excel Virus: Send password to Internet Functionality level Open/read Open/write Cmd /c dir something do useful password send internet API calls something password useful do send internet API1 API2 API3 API6 API7 System Calls System Service Executive Operations Memory Sections File Objects somesswordsendint usefuthingpaldoernet Handle 1 Handle 2 Handle 1 Handle 5 Kernel mode
How to model functionalities? - Via CPN. How CPN works? – it assembles appropriate system calls into functionality Call #11 Call #8 Call #22 Functionality: Chain 5,11 Functionality Call #5