Orchestra: Intrusion Detection Using Parallel Execution and Monitoring of Program Variants in User-Space

被引:0
|
作者
Salamat, Babak [1 ]
Jackson, Todd [1 ]
Gal, Andreas [1 ]
Franz, Michael [1 ]
机构
[1] Univ Calif Irvine, Dept Comp Sci, Sch Informat & Comp Sci, Irvine, CA 92717 USA
关键词
process monitoring; intrusion detection; multi-variant execution; multi-core processors; vulnerability;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In a Multi-Variant Execution Environment (MVEE), several slightly different versions of the same program are executed in lockstep. While this is done, a monitor compares the behavior of the versions at certain synchronization points with the aim of detecting discrepancies which may indicate attacks. As we show, the monitor can be implemented entirely in user space, eliminating the need for kernel modifications. As a result, the monitor is not a part of the trusted code base. We have built a fully functioning MVEE, named Orchestra, and evaluated its effectiveness. We obtained benchmark results on a quad-core system, using two variants which grow the stack in opposite directions. The results show that the overall penalty of simultaneous execution and monitoring of two variants on a multi-core system averages about 15% relative to unprotected conventional execution.
引用
收藏
页码:33 / 46
页数:14
相关论文
共 50 条
  • [1] Unprivileged Black-Box Detection of User-Space Keyloggers
    Ortolani, Stefano
    Giuffrida, Cristiano
    Crispo, Bruno
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2013, 10 (01) : 40 - 52
  • [2] THE IMPLEMENTATION AND APPLICATION OF USER-SPACE RSS TECHNOLOGY IN TRAFFIC MONITORING SYSTEM
    Li, Shu
    Yang, Fan
    Don, Yinan
    Lei, Zhenming
    2011 4TH IEEE INTERNATIONAL CONFERENCE ON BROADBAND NETWORK AND MULTIMEDIA TECHNOLOGY (4TH IEEE IC-BNMT2011), 2011, : 359 - 364
  • [3] Rcryptect: Real-time detection of cryptographic function in the user-space filesystem
    Lee, Seungkwang
    Jho, Nam-su
    Chung, Doyoung
    Kang, Yousung
    Kim, Myungchul
    COMPUTERS & SECURITY, 2022, 112
  • [4] Reducing TCB of Linux Kernel Using User-Space Device Driver
    Qiang, Weizhong
    Zhang, Kang
    Jin, Hai
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2016, 2016, 10048 : 572 - 585
  • [5] Communicating between the kernel and user-space in Linux using Netlink sockets
    Neira-Ayuso, Pablo
    Gasca, Rafael M.
    Lefevre, Laurent
    SOFTWARE-PRACTICE & EXPERIENCE, 2010, 40 (09): : 797 - 810
  • [6] Intramural Network Intrusion Detection by Monitoring User Behavior
    Zeng, Na
    Zhang, Xiaolong
    Zhang, Hong
    2009 SECOND INTERNATIONAL SYMPOSIUM ON KNOWLEDGE ACQUISITION AND MODELING: KAM 2009, VOL 3, 2009, : 178 - 181
  • [7] CellDAM: User-Space, Rootless Detection and Mitigation for 5G Data Plane
    Tan, Zhaowei
    Zhao, Jinghao
    Ding, Boyan
    Lu, Songwu
    PROCEEDINGS OF THE 20TH USENIX SYMPOSIUM ON NETWORKED SYSTEMS DESIGN AND IMPLEMENTATION, NSDI 2023, 2023, : 1601 - 1619
  • [8] Enhancing VNF's performance using DPDK driven OVS user-space forwarding
    Vladislavic, Dani
    Huljenic, Darko
    Ozegovic, Julije
    2017 25TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2017, : 151 - 155
  • [9] Intrusion Detection Using Signatures Extracted from Execution Profiles
    El-Ghali, Marwa
    Masri, Wes
    2009 ICSE WORKSHOP ON SOFTWARE ENGINEERING FOR SECURE SYSTEMS, 2009, : 17 - 24
  • [10] Reproducing the behavior of a parallel program by using dataflow execution models
    Takahashi, N
    Miei, T
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 1997, E80D (04) : 495 - 503