Check out the new USENIX Web site. next up previous
Next: Acknowledgment Up: Using Text Categorization Techniques Previous: Summary

Discussion

In spite of the encouraging initial results, there are several issues that require deeper analysis.

Our approach is predicated on the following properties: the frequencies of system calls issued by a program appear consistently across its normal executions and unseen system calls will be executed or unusual frequencies of the invoked system calls will appear when the program is exploited. We believe these properties hold true for many programs. However, if an intrusion does not reveal any anomaly in the frequencies of system calls, our method would miss it. For example, attacks that consist of abuse of perfectly normal processes such as process table would not be identified by the kNN classifier.

With the kNN classifier method, each process is classified when it terminates. We argue that it could still be suitable for real-time intrusion detection. Each intrusive attack is usually conducted within one or more sessions, and every session contains several processes. Since the kNN classifier method monitors the execution of each process, it is highly likely that an attack can be detected while it is in operation. However, it is possible that an attacker can avoid being detected by not letting the process exit. Therefore, there is a need for effective classification during a process's execution, which is a significant issue for our future work.


next up previous
Next: Acknowledgment Up: Using Text Categorization Techniques Previous: Summary
Yihua Liao 2002-05-13