Using Independent Auditors as Intrusion Detection Systems | SpringerLink
Skip to main content

Using Independent Auditors as Intrusion Detection Systems

  • Conference paper
  • First Online:
Information and Communications Security (ICICS 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2513))

Included in the following conference series:

Abstract

A basic method in computer security is to perform integrity checks on the file system to detect the installation of malicious programs, or the modification of sensitive files. Integrity tools to date rely on the operating system to function correctly, so once the operating system is compromised even a novice attacker can easily defeat these tools. A novel way to overcome this problem is the use of an independent auditor, which uses an out-of-band verification process that does not depend on the underlying operating system. In this paper we present a definition of independent auditors and a specific implementation of an independent auditor using an embedded system attached to the PCI bus.

This work funded in part by DARPA grant #F306020120535

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. G. H. Kim and E. H. Spafford: The design and Implementation of TRIPWIRE: A File System integrity checker. Technical Report, TR-93-071.

    Google Scholar 

  2. R. Lehti, P. Virolainen: AIDE (Advanced Intrusion Detection Environment), Web ref: http://www.cs.tut.fi/~rammer/aide.html

  3. S. M Beattie, Andrew P. Black, Cristing Cowan, Calton Pu, Lateef P. Yang: Cryptomark: Locking the Stable door qahead of the Trojan Horse. Technical review, Jul 2000.

    Google Scholar 

  4. L. Van Doorn, G. Ballintijn and W. Arbaugh: Signed Executables for Linux. Technical review, 2000.

    Google Scholar 

  5. “Halflife”: Bypassing Integrity Checking Systems. Phrack, volume 7, Issue 51, September 1997.

    Google Scholar 

  6. CERT(r): em Incident Note IN-2001-01, Widespread Compromises via “ramen“ Toolkit. January 18, 2001

    Google Scholar 

  7. Pedestal software, Integrity Protection Driver (IPD), http://pedestalsoftware.com/intact/ipd/

  8. Mike Bond, Ross Anderson: API-Level Attacks on Embedded Systems. In IEEE Computer Vol. 34, No. 10 pp. 67–75, October 2001.

    Google Scholar 

  9. Bruce Schneier and John Kelsey: Secure Audit Logs to Support Computer Forensics. ACM transactions on Information and System Security, Vol. 2, No 2, May 1999, Pages 159–176.

    Article  Google Scholar 

  10. Intel Corporation: Datasheet, 21285 Core Logicfor the SA-110 Microprocessor. September 1998.

    Google Scholar 

  11. Intel Corporation: Reference Manual, StrongARM EBSA-285 Evaluation Board. October 1998.

    Google Scholar 

  12. M. Tanuan: An Introduction to the Linux operating system Architecture Web Reference http://www.grad.math.uwaterloo.ca/~mctanuan/cs746g/LinuxCA.html

  13. PCI Special Interest Group: PCI Local Bus Specification, Revision 2.2. December 1998.

    Google Scholar 

  14. Intel Corporation: User Manual, 21555 Non-Transparent PCI-to-PCI Bridge. July 2001.

    Google Scholar 

  15. Jim Fischer: CiNIC-Calpoly Intelligent NIC. EE MS Thesis, June 2001.

    Google Scholar 

  16. Xilinx: Virtex-II Pro Platform FPGA Handbook. January 31 2002.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Molina, J., Arbaugh, W. (2002). Using Independent Auditors as Intrusion Detection Systems. In: Deng, R., Bao, F., Zhou, J., Qing, S. (eds) Information and Communications Security. ICICS 2002. Lecture Notes in Computer Science, vol 2513. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36159-6_25

Download citation

  • DOI: https://doi.org/10.1007/3-540-36159-6_25

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00164-5

  • Online ISBN: 978-3-540-36159-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics