Intrusion detection in distributed systems, an approach based on taint marking


Autoria(s): Hauser, Christophe; Tronel, Frederic; Mé, Ludovic; Fidge, Colin J.
Data(s)

2013

Resumo

This paper presents a new framework for distributed intrusion detection based on taint marking. Our system tracks information flows between applications of multiple hosts gathered in groups (i.e., sets of hosts sharing the same distributed information flow policy) by attaching taint labels to system objects such as files, sockets, Inter Process Communication (IPC) abstractions, and memory mappings. Labels are carried over the network by tainting network packets. A distributed information flow policy is defined for each group at the host level by labeling information and defining how users and applications can legally access, alter or transfer information towards other trusted or untrusted hosts. As opposed to existing approaches, where information is most often represented by two security levels (low/high, public/private, etc.), our model identifies each piece of information within a distributed system, and defines their legal interaction in a fine-grained manner. Hosts store and exchange security labels in a peer to peer fashion, and there is no central monitor. Our IDS is implemented in the Linux kernel as a Linux Security Module (LSM) and runs standard software on commodity hardware with no required modification. The only trusted code is our modified operating system kernel. We finally present a scenario of intrusion in a web service running on multiple hosts, and show how our distributed IDS is able to report security violations at each host level.

Formato

application/pdf

Identificador

http://eprints.qut.edu.au/64725/

Publicador

IEEE Computer Society

Relação

http://eprints.qut.edu.au/64725/1/accepted-version.pdf

DOI:10.1109/ICC.2013.6654811

Hauser, Christophe, Tronel, Frederic, Mé, Ludovic, & Fidge, Colin J. (2013) Intrusion detection in distributed systems, an approach based on taint marking. In Proceedings of the 2013 IEEE International Conference on Communications (ICC), IEEE Computer Society, Budapest, Hungary, pp. 1962-1967.

Direitos

Copyright 2013 IEEE

Fonte

Science & Engineering Faculty

Palavras-Chave #080303 Computer System Security #Information security #Computer networking #Taint analysis #Intrusion detection
Tipo

Conference Paper