首页> 外文会议>IEEE Network Operations and Management Symposium >Bezoar: Automated Virtual Machine-based Full-System Recovery from Control-Flow Hijacking Attacks
【24h】

Bezoar: Automated Virtual Machine-based Full-System Recovery from Control-Flow Hijacking Attacks

机译:Bezoar:自动化虚拟机的全系统恢复从控制流动劫持攻击

获取原文

摘要

System availability is difficult for systems to maintain in the face of Internet worms. Large systems have vulnerabilities, and if a system attempts to continue operation after an attack, it may not behave properly. Traditional mechanisms for detecting attacks disrupt service and current recovery approaches are application-based and cannot guarantee recovery in the face of exploits that corrupt the kernel, involve multiple processes or target multithreaded network services. This paper presents Bezoar, an automated full-system virtual machine-based approach to recover from zero-day control-flow hijacking attacks. Bezoar tracks down the source of network bytes in the system and after an attack, replays the checkpointed run while ignoring inputs from the malicious source. We evaluated our proof-of-concept prototype on six notorious exploits for Linux and Windows. In all cases, it recovered the full system state and resumed execution. Bezoar incurs low overhead to the virtual machine: less than 1% for the recovery and log components and approximately 1.4× for the memory monitor component that tracks down network bytes, for five SPEC INT 2000 benchmarks.
机译:系统可用性难以在互联网蠕虫面上维护。大型系统具有漏洞,如果系统在攻击后尝试继续操作,则可能无法正常运行。用于检测攻击的传统机制中断服务和当前恢复方法是基于应用程序的,并且不能保证损坏内核的漏洞的恢复,涉及多个进程或目标多线程网络服务。本文呈现Bezoar,这是一种自动化的全系统虚拟机的方法,可以从零天控制流动劫持攻击中恢复。 Bezoar追踪系统中的网络字节源,在攻击之后,重播检查点运行,同时忽略恶意源的输入。我们在Linux和Windows的六个臭名昭着的利用上评估了我们的概念验证原型。在所有情况下,它恢复了完整的系统状态并恢复执行。 Bezoar突出了低开销到虚拟机:恢复和日志组件的距离小于1%,对于追踪网络字节的内存监视器组件,对于五个规格2000基准测试,恢复和日志组件大约为1.4倍。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号