SECURE INITIALIZATION OF INTRUSION DETECTION SYSTEM
First Claim
1. A method in a computer system for detecting intrusions during a bootstrapping phase of an intrusion detection system, the method comprising:
- storing a behavior profile associated with an application, wherein the stored behavior profile is cryptographically protected;
reading, with the computer system during a bootstrapping phase of an intrusion detection system, the stored behavior profile associated with the application;
monitoring execution of the application at the computer system during the bootstrapping phase, according to the behavior profile; and
if the behavior of the application does not conform to the behavior profile, issuing a message indicating that the application is not conforming to the behavior profile.
0 Assignments
0 Petitions
Accused Products
Abstract
Secure initialization for detecting intrusions is disclosed. The secure initialization includes storing a behavior profile associated with an application, and reading the stored behavior profile that is cryptographically protected. The method further includes monitoring execution of the application during a bootstrapping phase of an intrusion detection system, according to the stored behavior profile. If the behavior of the application does not conform to the behavior profile, a message is issued indicating that the application is not conforming to the behavior profile. The behavior profile can be generated by a developer of the intrusion detection system, a developer of the application, and/or a third party developer. Additionally, the behavior profile is generated by executing the system on a reference computer system or by heuristic determination.
21 Citations
20 Claims
-
1. A method in a computer system for detecting intrusions during a bootstrapping phase of an intrusion detection system, the method comprising:
-
storing a behavior profile associated with an application, wherein the stored behavior profile is cryptographically protected; reading, with the computer system during a bootstrapping phase of an intrusion detection system, the stored behavior profile associated with the application; monitoring execution of the application at the computer system during the bootstrapping phase, according to the behavior profile; and if the behavior of the application does not conform to the behavior profile, issuing a message indicating that the application is not conforming to the behavior profile. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer readable storage medium storing computer instructions for detecting intrusions during a bootstrapping phase of an intrusion detection system, the computer instructions including instructions for:
-
storing a behavior profile associated with an application, wherein the stored behavior profile is cryptographically protected; reading, with the computer system during a bootstrapping phase of an intrusion detection system, the stored behavior profile associated with the application; monitoring execution of the application at the computer system during the bootstrapping phase, according to the behavior profile; and if the behavior of the application does not conform to the behavior profile, issuing a message indicating that the application is not conforming to the behavior profile. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer system for detecting intrusions during a bootstrapping phase of an intrusion detection system, comprising:
-
a first memory for storing an application; a second memory for storing a behavior profile associated with the application, wherein the stored behavior profile is cryptographically protected; a monitor, communicatively coupled with the first memory and the second memory, for reading, with the computer system during a bootstrapping phase of an intrusion detection system, the stored behavior profile associated with the application, and monitoring execution of the application at the computer system during the bootstrapping phase, according to the behavior profile; and a warning module, communicatively coupled with the monitor, for issuing a message indicating that the application is not conforming to the behavior profile. - View Dependent Claims (20)
-
Specification