Skip to main navigation Skip to search Skip to main content

Taint-enhanced anomaly detection

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

6 Scopus citations

Abstract

Anomaly detection has been popular for a long time due to its ability to detect novel attacks. However, its practical deployment has been limited due to false positives. Taint-based techniques, on the other hand, can avoid false positives for many common exploits (e.g., code or script injection), but their applicability to a broader range of attacks (non-control data attacks, path traversals, race condition attacks, and other unknown attacks) is limited by the need for accurate policies on the use of tainted data. In this paper, we develop a new approach that combines the strengths of these approaches. Our combination is very effective, detecting attack types that have been problematic for taint-based techniques, while significantly cutting down the false positives experienced by anomaly detection. The intuitive justification for this result is that a successful attack involves unusual program behaviors that are exercised by an attacker. Anomaly detection identifies unusual behaviors, while fine-grained taint can filter out behaviors that do not seem controlled by attacker-provided data.

Original languageEnglish
Title of host publicationInformation Systems Security - 7th International Conference, ICISS 2011, Proceedings
Pages160-174
Number of pages15
DOIs
StatePublished - 2011
Event7th International Conference on Information Systems Security, ICISS 2011 - Kolkata, India
Duration: Dec 15 2011Dec 19 2011

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7093 LNCS

Conference

Conference7th International Conference on Information Systems Security, ICISS 2011
Country/TerritoryIndia
CityKolkata
Period12/15/1112/19/11

Fingerprint

Dive into the research topics of 'Taint-enhanced anomaly detection'. Together they form a unique fingerprint.

Cite this