On the Comparison of User Space and Kernel Space Traces in Identification of Software Anomalies

PDF

Authors
  1. Murtaza, S.S.
  2. Sultana, A.
  3. Hamou-Lhakj, A.
  4. Couture, M.
Corporate Authors
Defence Research and Development Canada, Valcartier Research Centre, Quebec QC (CAN);Concordia Univ, Montreal QUE (CAN)
Abstract
Corrective software maintenance consumes 30-60% time of software maintenance activities. Automated failure reporting has been introduced to facilitate developers in debugging failures during corrective maintenance. However, reports of software with large user bases overwhelm developers in identification of the origins of faults, and in many cases it is not known whether reports of failures contain information about faults. Prior techniques employ different classification or anomaly detection algorithms on user space traces (e.g., function calls) or kernel space traces (e.g., system calls) to detect anomalies in software behaviour. Each algorithm and type of tracing (user space or kernel space) has its advantages and disadvantages. For example, user space tracing is useful in detailed analysis of anomalous (faulty) behaviour of a program whereas kernel space tracing is useful in identifying system intrusions, program intrusions, or malicious programs even if source program code is different. If one type of tracing or algorithm is infeasible to implement then it is important to know whether we can substitute another type of tracing and algorithm. In this paper, we compare user space and kernel space tracing by employing different types of classification algorithms on the traces of various programs. Our results show that kernel space tracing can be used to identify software anomalies with better accuracy than user space tracing. In fact, the majority of software anomalies (appro
Keywords
anomaly detection;cyber-threat;execution trace
Report Number
DRDC-RDDC-2016-N020 — External Literature
Date of publication
01 Nov 2011
Number of Pages
10
DSTKIM No
CA037287
CANDIS No
537036
Format(s):
Electronic Document(PDF)

Permanent link

Document 1 of 1

Date modified: