Automated Discovery of Mimicry Attacks

نویسندگان

  • Jonathon T. Giffin
  • Somesh Jha
  • Barton P. Miller
چکیده

Model-based anomaly detection systems restrict program execution by a predefined model of allowed system call sequences. These systems are useful only if they detect actual attacks. Previous research developed manuallyconstructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model. Our work helps to automate the discovery of such attacks. We start with two models: a program model of the application’s system call behavior and a model of security-critical operating system state. Given unsafe OS state configurations that describe the goals of an attack, we then find system call sequences allowed as valid execution by the program model that produce the unsafe configurations. Our experiments show that we can automatically find attack sequences in models of programs such as wu-ftpd and passwd that previously have only been discovered manually. When undetected attacks are present, we frequently find the sequences with less than 2 seconds of computation.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Survey on Perception of People Regarding Utilization of Computer Science & Information Technology in Manipulation of Big Data, Disease Detection & Drug Discovery

this research explores the manipulation of biomedical big data and diseases detection using automated computing mechanisms. As efficient and cost effective way to discover disease and drug is important for a society so computer aided automated system is a must. This paper aims to understand the importance of computer aided automated system among the people. The analysis result from collected da...

متن کامل

Crowdsourcing Attacks on Biometric Systems

We introduce a new approach for attacking and analyzing biometric-based authentication systems, which involves crowdsourcing the search for potential impostors to the system. Our focus is on voice-based authentication, or speaker verification (SV), and we propose a generic method to use crowdsourcing for identifying candidate “mimics” for speakers in a given target population. We then conduct a...

متن کامل

Evading DDoS detection with mimicry attacks

Distributed Denial of Service (DDoS) attacks are security attacks that prevent normal use of communication facilities. More and more DDoS attacks are occurring each day. Conventional DDoS attacks are typically based on flooding the server. Currently, other types of DDoS attacks have been observed, such as the mimicry DDoS attack. The mimicry attack is characterized by (1) gradual increase in th...

متن کامل

Evolving Buffer Overflow Attacks with Detector Feedback

A mimicry attack is an exploit in which basic behavioral objectives of a minimalist ’core’ attack are used to design multiple attacks achieving the same objective from the same application. Research in mimicry attacks is valuable in determining and eliminating detector weaknesses. In this work, we provide a process for evolving all components of a mimicry attack relative to the Stide (anomaly) ...

متن کامل

Improving Host-Based IDS with Argument Abstraction to Prevent Mimicry Attacks

ion to Prevent Mimicry Attacks Sufatrio and Roland H. C. Yap 1 Temasek Laboratories, National University of Singapore 5 Sports Drive 2, Singapore 117508, Singapore [email protected] 2 School of Computing, National University of Singapore 3 Science Drive 2, Singapore 117543, Singapore [email protected] Abstract. A popular class of host-based Intrusion Detection Systems (IDS) are those based...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006