Check out the new USENIX Web site. next up previous
Next: Experiments and Performance Measurement Up: Implementation Previous: Signature-based Techniques

Sequence-based Techniques

The sequence-based intrusion detection approach by Forrest [3] calculates an anomaly value for a program execution based on the number of sequences the program generates that are missed in a pre-computed database of sequences. The technique has been found to be effective under offline evaluation using audit data collected from different environments. It requires properly-constructed norma sensitive to program versions and configuration, and can in some cases require significant processing resources to perform anomaly calculation in real time. We have structured Seq_id, our sequence-based ID wrapper, to address these issues. Seq_id runs in two modes: record mode and detect mode. In record mode, Seq_id automatically generates a normative sequence database for each program executed. Using Seq_id, we have generated a per-program database for every program executed on our test machines. To increase efficiency and simplicity, we have slightly modified the algorithm described in [2] to merge some sequences, which would remain unique in the original technique. Initial comparison tests between the two algorithms indicate that the detection accuracy is similar. In detect mode, Seq_id decides if each observed system call completes a sequence stored in the program's database of normal behavior. Seq_id measures the magnitude of each deviation, and reports those of sufficient magnitude.
next up previous
Next: Experiments and Performance Measurement Up: Implementation Previous: Signature-based Techniques
Calvin Ko
2000-06-13