Exploiting Execution Context for the Detection of Anomalous System Calls

  • Darren Mutz, William Robertson, Giovanni Vigna, Richard Kemmerer
  • Proceedings of the International Symposium on Recent Advances on Intrusion Detection (RAID)
  • PDF
Abstract.

Attacks against privileged applications can be detected by analyzing the stream of system calls issued during process execution. In the last few years, several approaches have been proposed to detect anomalous system calls. These approaches are mostly based on modeling acceptable system call sequences. Unfortunately, the techniques proposed so far are either vulnerable to certain evasion attacks or are too expensive to be practical.

This paper presents a novel approach to the analysis of system calls that uses a composition of dynamic analysis and learning techniques to characterize anomalous system call invocations in terms of both the invocation context and the parameters passed to the system calls. Our technique provides a more precise detection model with respect to solutions proposed previously, and, in addition, it is able to detect data modiļ¬cation attacks, which cannot be detected using only system call sequence analysis.