The Community for Technology Leaders
Computer Security Applications Conference, Annual (1999)
Phoenix, Arizona
Dec. 6, 1999 to Dec. 10, 1999
ISSN: 1063-9527
ISBN: 0-7695-0346-2
pp: 378
Nittida Nuansri , Prince of Songkla University
Samar Singh , La Trobe University
Tharam S. Dillon , La Trobe University
This paper describes a new technique for detecting security breaches in a computer system. For each Unix process, the user credentials, which are user identifiers, determine the process privilege, including whether a process has gained a high privilege, such as that of the superuser. The state transition technique is applied to a suitably defined process state, identified by certain classes of user credential values. A transition takes place when these values change from one class to another. These states are clearly defined, and prohibited state transitions as well as some supporting rules are identified. When many break-ins succeed, either the rules are violated or these prohibited transitions occur, and this implies a violation of system security policy. A specially modified system call, ktrace(), is used by the superuser to monitor the process-state and state transition analysis is applied to the traced information, by the Intrusion Detection System. Tests show that most known security violations belonging to the targeted classes (such as buffer overflow exploits) can be detected (and possibly pre-empted) while the constituent activities are still being processed in the kernel.

S. Singh, N. Nuansri and T. S. Dillon, "A Process State-Transition Analysis and its Application to Intrusion Detection," Computer Security Applications Conference, Annual(ACSAC), Phoenix, Arizona, 1999, pp. 378.
86 ms
(Ver 3.3 (11022016))