References & Citations
Computer Science > Cryptography and Security
Title: Learning Execution Contexts from System Call Distributions for Intrusion Detection in Embedded Systems
(Submitted on 23 Jan 2015 (v1), last revised 2 Aug 2015 (this version, v2))
Abstract: Existing techniques used for intrusion detection do not fully utilize the intrinsic properties of embedded systems. In this paper, we propose a lightweight method for detecting anomalous executions using a distribution of system call frequencies. We use a cluster analysis to learn the legitimate execution contexts of embedded applications and then monitor them at run-time to capture abnormal executions. We also present an architectural framework with minor processor modifications to aid in this process. Our prototype shows that the proposed method can effectively detect anomalous executions without relying on sophisticated analyses or affecting the critical execution paths.
Submission history
From: Man-Ki Yoon [view email][v1] Fri, 23 Jan 2015 21:28:02 GMT (2353kb)
[v2] Sun, 2 Aug 2015 04:33:17 GMT (2211kb,D)
Link back to: arXiv, form interface, contact.