Next: Experiments and Performance Measurement
Up: Implementation
Previous: Signature-based Techniques
The sequence-based intrusion detection approach by Forrest [3]
calculates an anomaly value for a program execution based on the number of
sequences the program generates that are missed in a pre-computed database of
sequences. The technique has been found to be effective under offline
evaluation using audit data collected from different environments.
It requires properly-constructed norma
sensitive to program versions and configuration, and can in some cases
require significant processing resources to perform anomaly calculation in
real time.
We have structured Seq_id, our sequence-based ID wrapper,
to address these issues.
Seq_id runs in two modes: record mode and detect mode. In record
mode, Seq_id automatically generates a normative sequence database for
each program executed. Using Seq_id, we have generated a per-program
database for every program executed on our test machines. To increase
efficiency and simplicity, we have slightly modified the algorithm
described in [2] to merge some sequences, which would remain unique in
the original technique. Initial comparison tests between the two
algorithms indicate that the detection accuracy is similar. In detect
mode, Seq_id decides if each observed system call completes a sequence
stored in the program's database of normal behavior. Seq_id measures
the magnitude of each deviation, and reports those of sufficient
magnitude.
Next: Experiments and Performance Measurement
Up: Implementation
Previous: Signature-based Techniques
Calvin Ko
2000-06-13