An intrusion detection system using alteration of data

Fumiaki Nagano, Kohei Tatara, Toshihiro Tabata, Kouichi Sakurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Attacks against data in memory are one of the most serious threats these days. Although many detection systems have been proposed so far, most of them can detect only part of alteration. Some detection systems use canaries to detect alteration. However, if an execution code has bugs that enable attackers to read data in memory, the system could be bypassed by attackers who can guess canaries. To overcome the problems, we propose a system using alteration of data. Our proposed system detects illegal alteration with verifier for vulnerable data. Verifier is made before vulnerable data could be altered by attackers, and verifier is checked when the program uses the vulnerable data. Part of Verifier is stored in kernel area to prevent attackers from reading data in user memory. Our approach can detect illegal alteration of arbitrary data in user memory. Our proposed system, moreover, does not have the problem systems using canaries have.

Original languageEnglish
Title of host publicationProceedings - 20th International Conference on Advanced Information Networking and Applications
Pages243-248
Number of pages6
DOIs
Publication statusPublished - 2006
Event20th International Conference on Advanced Information Networking and Applications - Vienna, Austria
Duration: Apr 18 2006Apr 20 2006

Publication series

NameProceedings - International Conference on Advanced Information Networking and Applications, AINA
Volume1
ISSN (Print)1550-445X

Other

Other20th International Conference on Advanced Information Networking and Applications
Country/TerritoryAustria
CityVienna
Period4/18/064/20/06

All Science Journal Classification (ASJC) codes

  • Engineering(all)

Fingerprint

Dive into the research topics of 'An intrusion detection system using alteration of data'. Together they form a unique fingerprint.

Cite this