Automated discovery of mimicry attacks

被引:0
|
作者
Giffin, Jonathon T. [1 ]
Jha, Somesh [1 ]
Miller, Barton P. [1 ]
机构
[1] Univ Wisconsin, Dept Comp Sci, Madison, WI 53706 USA
关键词
IDS evaluation; model checking; attacks; model-based anomaly detection;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Model-based anomaly detection systems restrict program execution by a predefined model of allowed system call sequences. These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model. Our work helps to automate the discovery of such attacks. We start with two models: a program model of the application's system call behavior and a model of security-critical operating system state. Given unsafe OS state configurations that describe the goals of an attack, we then find system call sequences allowed as valid execution by the program model that produce the unsafe configurations. Our experiments show that we can automatically find attack sequences in models of programs such as wu-ftpd and passwd that previously have only been discovered manually. When undetected attacks are present, we frequently find the sequences with less than 2 seconds of computation.
引用
收藏
页码:41 / 60
页数:20
相关论文
共 50 条
  • [41] Static analysis on x86 executables for preventing automatic mimicry attacks
    Bruschi, Danilo
    Cavallaro, Lorenzo
    Lanzi, Andrea
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, PROCEEDINGS, 2007, 4579 : 213 - +
  • [42] Improving host-based IDS with argument abstraction to prevent mimicry attacks
    Sufatrio
    Yap, RHC
    RECENT ADVANCES IN INTRUSION DETECTION, 2006, 3858 : 146 - 164
  • [43] Secure Neighbor Discovery (SeND): Attacks and Challenges
    Ahmed, Amjed Sid
    Hassan, Rosilah
    Othman, Nor Effendy
    PROCEEDINGS OF THE 2017 6TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATICS (ICEEI'17), 2017,
  • [44] UNDERSTANDING FEATURE DISCOVERY IN WEBSITE FINGERPRINTING ATTACKS
    Mathews, Nate
    Sirinam, Payap
    Wright, Matthew
    2018 IEEE WESTERN NEW YORK IMAGE AND SIGNAL PROCESSING WORKSHOP (WNYISPW), 2018,
  • [45] On the Impact of DoS Attacks on Secure Service Discovery
    Trabelsi, Slim
    Urvoy-Keller, Guillaume
    Roudier, Yves
    EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 532 - +
  • [46] Combination Attacks and Defenses on SDN Topology Discovery
    Kong, Dezhang
    Shen, Yi
    Chen, Xiang
    Cheng, Qiumei
    Liu, Hongyan
    Zhang, Dong
    Liu, Xuan
    Chen, Shuangxi
    Wu, Chunming
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2023, 31 (02) : 904 - 919
  • [47] situ: Situational Understanding and Discovery for Cyber Attacks
    Harrison, Lane
    Laska, Jason
    Spahn, Riley
    Iannacone, Mike
    Downing, Evan
    Ferragut, Erik M.
    Goodall, John R.
    2012 IEEE CONFERENCE ON VISUAL ANALYTICS SCIENCE AND TECHNOLOGY (VAST), 2012, : 307 - 308
  • [48] Automated Identification of Desynchronisation Attacks on Shared Secrets
    Mauw, Sjouke
    Smith, Zach
    Toro-Pozo, Jorge
    Trujillo-Rasua, Rolando
    COMPUTER SECURITY (ESORICS 2018), PT I, 2018, 11098 : 406 - 426
  • [49] Automated Signature Extraction for High Volume Attacks
    Afek, Yehuda
    Bremler-Barr, Anat
    Feibish, Shir Landau
    2013 ACM/IEEE SYMPOSIUM ON ARCHITECTURES FOR NETWORKING AND COMMUNICATIONS SYSTEMS (ANCS), 2013, : 147 - 156
  • [50] Matrigel: From discovery and ECM mimicry to assays and models for cancer research
    Benton, Gabriel
    Arnaoutova, Irina
    George, Jay
    Kleinman, Hynda K.
    Koblinski, Jennifer
    ADVANCED DRUG DELIVERY REVIEWS, 2014, 79-80 : 3 - 18