Intrusion detection in distributed systems, an approach based on taint marking
Data(s) |
2013
|
---|---|
Resumo |
This paper presents a new framework for distributed intrusion detection based on taint marking. Our system tracks information flows between applications of multiple hosts gathered in groups (i.e., sets of hosts sharing the same distributed information flow policy) by attaching taint labels to system objects such as files, sockets, Inter Process Communication (IPC) abstractions, and memory mappings. Labels are carried over the network by tainting network packets. A distributed information flow policy is defined for each group at the host level by labeling information and defining how users and applications can legally access, alter or transfer information towards other trusted or untrusted hosts. As opposed to existing approaches, where information is most often represented by two security levels (low/high, public/private, etc.), our model identifies each piece of information within a distributed system, and defines their legal interaction in a fine-grained manner. Hosts store and exchange security labels in a peer to peer fashion, and there is no central monitor. Our IDS is implemented in the Linux kernel as a Linux Security Module (LSM) and runs standard software on commodity hardware with no required modification. The only trusted code is our modified operating system kernel. We finally present a scenario of intrusion in a web service running on multiple hosts, and show how our distributed IDS is able to report security violations at each host level. |
Formato |
application/pdf |
Identificador | |
Publicador |
IEEE Computer Society |
Relação |
http://eprints.qut.edu.au/64725/1/accepted-version.pdf DOI:10.1109/ICC.2013.6654811 Hauser, Christophe, Tronel, Frederic, Mé, Ludovic, & Fidge, Colin J. (2013) Intrusion detection in distributed systems, an approach based on taint marking. In Proceedings of the 2013 IEEE International Conference on Communications (ICC), IEEE Computer Society, Budapest, Hungary, pp. 1962-1967. |
Direitos |
Copyright 2013 IEEE |
Fonte |
Science & Engineering Faculty |
Palavras-Chave | #080303 Computer System Security #Information security #Computer networking #Taint analysis #Intrusion detection |
Tipo |
Conference Paper |