Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Behavior-based host-based intrusion prevention system

Inactive Publication Date: 2004-07-22
SYMANTEC CORP
View PDF3 Cites 320 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

0025] FIG. 1 shows conventional perimeter security approaches.
0026] FIG. 2 show

Problems solved by technology

There is a growing awareness that existing security infrastructure that guards the perimeter (e.g., firewalls) or uses signatures (e.g., anti-virus and intrusion detection) is no longer adequate protection against new and unknown attacks or hostile insiders.
Because of these mandates and the inability of perimeter security to protect applications and servers, critical computing resources are exposed to severe and frequent damage.
When a new attack appears (and all attacks are new and unknown at first) it slips past existing defenses (firewall, intrusion detection, and anti-virus software) and exploits some vulnerability in an application or operating system (e.g., buffer overflow) and then causes damage to critical computing resources.
In the case of a worm or virus, if a new attack propagates quickly, as many do (e.g., NIMDA, Melissa, I Love You), it damages thousands of servers before the defenses can be updated.
In addition to automated attacks, such as viruses and worms, there is a significant risk from malicious insiders.
Existing security products provide little defense against a malicious insider with legitimate privileges doing damage to servers.
Viruses, worms and hostile insiders cause substantial damage and loss of productivity and proprietary information and require each of the damaged servers to be repaired by reformatting, reconfiguring, recovering data or even replacing the server.
This type of defense does not account for damage caused from inside the network.
Many studies have shown that internal attacks account for a large percentage of damage.
Security, however, is not a top priority for application software vendors in today's market.
Market pressures force the vendors to deliver new features so rapidly that it is impossible to build software without inherent security flaws.
The requirements for today's applications are so complex that simply delivering a working product within deadlines is difficult.
The additional effort required to create a secure design and perform security testing is not practical.
Even if application vendors decided to make security a top priority for their products, there are significant barriers to developing secure applications.
Most software developers do not have the expertise to design and build secure software.
Additionally, secure applications are pointless without a secure foundation to host them.
Today's operating systems do not provide a secure foundation to protect applications or allow them to protect themselves.
But applying patches is not a strategic solution, because they are published only after the fact, only address known flaws, and are very cumbersome to deploy.
Even solving these problems cannot guarantee freedom from attacks.
There will always be people who misuse legitimate features of the software and cause damage to critical information.
The misuse might be accidental or malicious but the result is the same--loss of information or services and downtime to which critical are the enterprise.
Independent reports published by Computer Security Institute / FBI, CERT / CC, and Gartner determined that known users accessing the corporate network from the outside cause 70% of all security breaches; 57% of the breaches are unintentional and the balance are malicious.
Further, because of the significant rise in identity theft, it is impossible to be certain whether or not a known user is the legitimate user or an imposter exploiting the access rights of the legitimate user's identity.
This means that applications will need to be more extensible and as a consequence more complex and vulnerable.
By requiring modification to the operating system, these solutions limit themselves to vendors who distribute their source code, and even in those cases, since they aren't part of the basic product development process, the solutions typically lag behind the most current versions of the operating systems.
This limits their usefulness in complex system deployments.
Since every change to the system-wide information has the potential to affect every other part, it is impractical to create very large or complex configurations.
Beyond a certain size, the author will not be able to determine whether a change has detrimental ramifications on another part of the configuration.
For this reason, the previous solutions either never reached commercial viability, or if they did, only provide simple, basic configurations and cannot be easily expanded for complex situations.
While they do a good job within their target area, they leave large portions of the system unprotected.
As a result, customers desiring overall protection of their computer systems must deploy a combination of products, each dealing with a part of the security problem.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Behavior-based host-based intrusion prevention system
  • Behavior-based host-based intrusion prevention system
  • Behavior-based host-based intrusion prevention system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] Reference will now be made in detail to the embodiments of the present invention, examples of which are illustrated in the accompanying drawings.

1 TABLE OF CONTENTS 1.0 Introduction 2.0 Requirements for a successful behavioral-based firewall 3.0 The APPFIRE .TM. Solution 4.0 Architectural Overview 4.1 APPFIRE .TM. Agent 4.2 Management Infrastructure 4.3 APPFIRE .TM. Manager 4.4 The APPFIRE .TM. Enterprise Manager 4.5 The APPFIRE .TM. Authoring Environment 5.0 System Behavior Policies 5.1 Modular Policy Definition 5.2 Process Sets 5.3 Behavior Control Descriptions (BCDs) 5.4 The APPFIRE .TM. Profiler 6.0 J2EE Application Server 7.0 System resources access control 8.0 Example--CodeRed worm 9.0 APPFIRE .TM. Case Studies 9.1 Protecting against Malicious Employees 9.2 Protecting Custom Applications 9.3 Protecting Public IIS Servers 9.4 Managing Policy in Large Organizations 9.5 Reducing the Time-Criticality of Patches

[0037] 1.0 Introduction

[0038] APPFIRE.TM. is an example of an ap...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method of protecting a system from attack that includes monitoring processes running on a system, identifying behavior of the processes and attributes of the processes, grouping the processes into process sets based on commonality of attributes, and generating behavior control descriptions for each process set.

Description

[0001] 1. Field of the Invention[0002] The present invention relates to host-based protection, and more particularly, to host-based protection that prevents attacks based on application behavior.[0003] 2. Related Art[0004] There is a growing awareness that existing security infrastructure that guards the perimeter (e.g., firewalls) or uses signatures (e.g., anti-virus and intrusion detection) is no longer adequate protection against new and unknown attacks or hostile insiders. With the advent of the Internet and organizational mandates to open internal systems to customers, suppliers and partners, the concept of a perimeter has changed forever. Because of these mandates and the inability of perimeter security to protect applications and servers, critical computing resources are exposed to severe and frequent damage.[0005] When a new attack appears (and all attacks are new and unknown at first) it slips past existing defenses (firewall, intrusion detection, and anti-virus software) a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06FG06F12/14G06F21/00H04L9/00H04L9/32
CPCG06F21/566G06F21/316
Inventor TAJALLI, HOMAYOONGRAHAM, JEFFREY J.FRASER, TIMOTHY J.
Owner SYMANTEC CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products