12.07.2015 Views

Journal of Emerging Technologies in Web Intelligence Contents

Journal of Emerging Technologies in Web Intelligence Contents

Journal of Emerging Technologies in Web Intelligence Contents

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

110 JOURNAL OF EMERGING TECHNOLOGIES IN WEB INTELLIGENCE, VOL. 2, NO. 2, MAY 2010Recovery Based Architecture To Protect HidsLog Files Us<strong>in</strong>g Time StampsSur<strong>in</strong>der S. KhuranaPunjab Engg. College, Chandigarh, Indiasur<strong>in</strong>ders<strong>in</strong>gh.cs07@pec.edu.<strong>in</strong>Divya Bansal , Pr<strong>of</strong>. Sanjeev S<strong>of</strong>atPunjab Engg. College, Chandigarh, IndiaAbstract – After the great revolution <strong>in</strong> the field <strong>of</strong>Information Technology, many applications made necessityto run computer systems (either servers or client mach<strong>in</strong>es)all the time. Along with improvements and new <strong>in</strong>ventions<strong>in</strong> technology, the threat <strong>of</strong> attacks through computernetworks becomes a large issue. Host Based IntrusionDetection is a part <strong>of</strong> security system that protects hostsfrom various k<strong>in</strong>ds <strong>of</strong> attacks. It also provides a greatdegree <strong>of</strong> visibility (<strong>of</strong> system activities). It is quite widestthat HIDS are vulnerable to attacks. An adversary, ifsuccessfully enters <strong>in</strong> a system can disable HIDS or modifyHIDS rules to hide its existence. One can easily evade HIDS.In [7] we propose a new architecture that protects HIDSfrom such attacks. In this paper, we have proposed a newmechanism to check <strong>in</strong>tegrity <strong>of</strong> log files. We have discussedits affects on performance <strong>of</strong> system.I. INTRODUCTIONIntrusion Detection System [5] is an imperative<strong>in</strong>gredient <strong>in</strong> network computer security which plays avital role <strong>in</strong> detect<strong>in</strong>g the <strong>in</strong>trusive activities before theyoccur. Intrusion Detection is usually done throughscann<strong>in</strong>g network traffic and/or hosts data and activities.These <strong>in</strong>trusive activities can be def<strong>in</strong>ed as - activitiesperformed by some adversary for ga<strong>in</strong><strong>in</strong>g unlawfulbenefits. The adverse affects <strong>of</strong> such <strong>in</strong>trusion activitiesare <strong>in</strong> terms <strong>of</strong> loss <strong>of</strong> confidentiality, <strong>in</strong>tegrity andavailability <strong>of</strong> resources or services.IDSs can be classified under various categories.Figure-1 illustrates the various classifications <strong>of</strong> IntrusionDetection Systems.Response BasedDoma<strong>in</strong> OfDetection BasedUnderly<strong>in</strong>gDetectionTechniqueBased• Active IDS• Passive IDS• HIDS• NIDS• Anomaly based IDS• Signature based IDSFigure-1: IDS ClassificationAn IDS can be active or passive. Passive IDS detectthe attacks and logs <strong>in</strong>formation or raise alarms. ActiveIDS takes action <strong>in</strong> response to an already detectedattack. Active IDSs are also known as IntrusionPrevention System.Section 2 discusses Detection and Recovery basedArchitecture to protect HIDS. Section 3 describes timestamp<strong>in</strong>g based protocol to check <strong>in</strong>tegrity <strong>of</strong> log files. Insection 4 and 5, we discuss implementation details.Affects <strong>of</strong> our architecture on system performance hasdescribed <strong>in</strong> section 6. In section 7, we discuss somerelated works. We present directions for future work <strong>in</strong> 6and our conclusion <strong>in</strong> section 8.II. OVERVIEW OF DETECTION AND RECOVERYBASED ARCHITECTUREIn [1], architecture has proposed to detect attacks onHIDS and recover HIDS to its previous healthy state. Thearchitecture protects HIDS from two type <strong>of</strong> attacks: firstis that it does not allow adversary to kill the HIDSprocess. And the other is it does not allow unauthorizedmodification <strong>of</strong> rule or signature database. The basic ideabeh<strong>in</strong>d the architecture is to allow the adversary toperform attack on HIDS and then recover the HIDS to itsprevious healthy state. A new process called MonitorIDShas been <strong>in</strong>troduced <strong>in</strong> the proposed architecture.MonitorIDS is a lightweight system process whichdetects the attacks that affects HIDS and takes requiredactions to recover HIDS from affects <strong>of</strong> that attack.MonitorIDS takes care <strong>of</strong> both HIDS process and<strong>in</strong>tegrity <strong>of</strong> HIDS related <strong>in</strong>formation. However, thisarchitecture does not consider underly<strong>in</strong>g technique usedby HIDS to detect <strong>in</strong>trusions. It can be used with eithersignature based or anomaly based IDS.Figure 2 depicts work<strong>in</strong>g <strong>of</strong> proposed architecture. Asshown <strong>in</strong> figure 2, a backup <strong>of</strong> HIDS related files hasbeen created immediately after the <strong>in</strong>stallation.MonitorIDS process is embedded with HIDS. Thisprocess regularly monitors the HIDS process and filesafter a small fraction <strong>of</strong> time gap. If MonitorIDS foundHIDS process dead (detect unauthorized kill <strong>of</strong> HIDS) itimmediately restarts the HIDS. It also monitors <strong>in</strong>tegrity<strong>of</strong> files related to HIDS. These files may <strong>in</strong>clude rule orsignature database. If it found any unauthorizedmodification <strong>of</strong> HIDS files it replace the modified files© 2010 ACADEMY PUBLISHERdoi:10.4304/jetwi.2.2.110-114

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!