Home // SECURWARE 2012 , The Sixth International Conference on Emerging Security Information, Systems and Technologies // View article
Compacting Security Signatures for PIGA IDS
Authors:
Pascal Berthomé
Jérémy Briffaut
Pierre Clairet
Keywords: security; operating system; modular decomposition
Abstract:
PIGA (Policy Interaction Graph Analysis) is a tool that detects malicious process behaviours by analysing the operating system activities. This tool uses signatures that represent illegal activities of some malicious user. These signatures are generated from a graph that models the performed operations at operating system (OS) level. For usual security properties, the number of signatures is large and they are stored in the memory during the detection process. In this paper, we present a way to reduce the memory required to store the signatures while preserving their quality. The methodology is derived from the modular decomposition of graphs. We investigate the impact of such an approach for the confidentiality property. The efficiency of the methodology is evaluated on interaction graphs of real operating systems. The number of signatures is divided by 20 for the tested confidentiality property.
Pages: 126 to 133
Copyright: Copyright (c) IARIA, 2012
Publication date: August 19, 2012
Published in: conference
ISSN: 2162-2116
ISBN: 978-1-61208-209-7
Location: Rome, Italy
Dates: from August 19, 2012 to August 24, 2012