Behavior-based host-based intrusion prevention system

Inactive Publication Date: 2004-07-22
SYMANTEC CORP
View PDF3 Cites 320 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

0025] FIG. 1 shows conventional perimeter security approaches.
0026] FIG. 2 show

Problems solved by technology

There is a growing awareness that existing security infrastructure that guards the perimeter (e.g., firewalls) or uses signatures (e.g., anti-virus and intrusion detection) is no longer adequate protection against new and unknown attacks or hostile insiders.
Because of these mandates and the inability of perimeter security to protect applications and servers, critical computing resources are exposed to severe and frequent damage.
When a new attack appears (and all attacks are new and unknown at first) it slips past existing defenses (firewall, intrusion detection, and anti-virus software) and exploits some vulnerability in an application or operating system (e.g., buffer overflow) and then causes damage to critical computing resources.
In the case of a worm or virus, if a new attack propagates quickly, as many do (e.g., NIMDA, Melissa, I Love You), it damages thousands of servers before the defenses can be updated.
In addition to automated attacks, such as viruses and worms, there is a significant risk from malicious insiders.
Existing security products provide little defense against a malicious insider with legitimate privileges doing damage to servers.
Viruses, worms and hostile insiders cause substantial damage and loss of productivity and proprietary information and require each of the damaged servers to be repaired by reformatting, reconfiguring, recovering data or even replacing the server.
This type of defense does not account for damage caused from inside the network.
Many studies have shown that internal attacks account for a large percentage of damage.
Security, however, is not a top priority for application software vendors in today's market.
Market pressures force the vendors to deliver new features so rapidly that it is impossible to build software without inherent security flaws.
The requirements for today's applications are so complex that simply delivering a working product within deadlines is difficult.
The additional effort required to create a secure design and perform security testing is not practical.
Even if application vendors decided to make security a top priority for their products, there are significant barriers to developing secure applications.
Most software developers do not have the expertise to design and build secure software.
Additionally, secure applications are pointless without a secure foundation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Behavior-based host-based intrusion prevention system
  • Behavior-based host-based intrusion prevention system
  • Behavior-based host-based intrusion prevention system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] Reference will now be made in detail to the embodiments of the present invention, examples of which are illustrated in the accompanying drawings.

1 TABLE OF CONTENTS 1.0 Introduction 2.0 Requirements for a successful behavioral-based firewall 3.0 The APPFIRE .TM. Solution 4.0 Architectural Overview 4.1 APPFIRE .TM. Agent 4.2 Management Infrastructure 4.3 APPFIRE .TM. Manager 4.4 The APPFIRE .TM. Enterprise Manager 4.5 The APPFIRE .TM. Authoring Environment 5.0 System Behavior Policies 5.1 Modular Policy Definition 5.2 Process Sets 5.3 Behavior Control Descriptions (BCDs) 5.4 The APPFIRE .TM. Profiler 6.0 J2EE Application Server 7.0 System resources access control 8.0 Example--CodeRed worm 9.0 APPFIRE .TM. Case Studies 9.1 Protecting against Malicious Employees 9.2 Protecting Custom Applications 9.3 Protecting Public IIS Servers 9.4 Managing Policy in Large Organizations 9.5 Reducing the Time-Criticality of Patches

[0037] 1.0 Introduction

[0038] APPFIRE.TM. is an example of an ap...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method of protecting a system from attack that includes monitoring processes running on a system, identifying behavior of the processes and attributes of the processes, grouping the processes into process sets based on commonality of attributes, and generating behavior control descriptions for each process set.

Description

[0001] 1. Field of the Invention[0002] The present invention relates to host-based protection, and more particularly, to host-based protection that prevents attacks based on application behavior.[0003] 2. Related Art[0004] There is a growing awareness that existing security infrastructure that guards the perimeter (e.g., firewalls) or uses signatures (e.g., anti-virus and intrusion detection) is no longer adequate protection against new and unknown attacks or hostile insiders. With the advent of the Internet and organizational mandates to open internal systems to customers, suppliers and partners, the concept of a perimeter has changed forever. Because of these mandates and the inability of perimeter security to protect applications and servers, critical computing resources are exposed to severe and frequent damage.[0005] When a new attack appears (and all attacks are new and unknown at first) it slips past existing defenses (firewall, intrusion detection, and anti-virus software) a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06FG06F12/14G06F21/00H04L9/00H04L9/32
CPCG06F21/566G06F21/316
Inventor TAJALLI, HOMAYOONGRAHAM, JEFFREY J.FRASER, TIMOTHY J.
Owner SYMANTEC CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products