首页> 外文学位 >Automated detection and containment of stealth attacks on the operating system kernel.
【24h】

Automated detection and containment of stealth attacks on the operating system kernel.

机译:自动检测和遏制操作系统内核上的隐身攻击。

获取原文
获取原文并翻译 | 示例

摘要

The operating system kernel serves as the root of trust for all applications running on the computer system. A compromised system can be exploited by remote attackers stealthily, such as exfiltration of sensitive information, wasteful usage of the system's resources, or involving the system in malicious activities without the user's knowledge or permission. The lack of appropriate detection tools allows such systems to stealthily lie within the attackers realm for indefinite periods of time.;Stealth attacks on the kernel are carried out by malware commonly known as rootkits. The goal of the rootkit is to conceal the presence of the attacker on the victim system. Conventionally, kernel rootkits modified the kernel to achieve stealth, while most functionality was provided by accompanying user space programs. The newer kernel rootkits achieve the malice and stealth solely by modifying kernel data. This dissertation explores the threat posed by both types of kernel rootkits and proposes novel automated techniques for their detection and containment.;Our first contribution is an automated containment technique built using the virtualization architecture. This technique counters the ongoing damage done to the system by the conventional kernel rootkits. It is well suited for attacks that employ kernel or user mode stealth but provide most of the malicious functionality as user space programs.;Our second contribution is to identify a new class of stealth attacks on the kernel, which do not exhibit explicit hiding behavior but are stealthy by design. They achieve their malicious objectives by solely modifying data within the kernel. These attacks demonstrate that the threat posed to kernel data is systemic requiring comprehensive protection.;Our final contribution is a novel automated technique that can be used for detection of such stealth data-centric attacks. The key idea behind this technique is to automatically identify and extract invariants exhibited by kernel data structures during a training phase. These invariants are used as specifications of data structure integrity and are enforced during runtime. Our technique could successfully detect all rootkits that were publicly available. It could also detect more recent stealth attacks developed by us or proposed by other recent research literature.
机译:操作系统内核是计算机系统上运行的所有应用程序的信任根。受到攻击的系统可能会被远程攻击者偷偷利用,例如泄露敏感信息,浪费系统资源或使系统参与未经用户知情或未经许可的恶意活动。缺乏合适的检测工具使此类系统可以无限期地秘密地位于攻击者的领域内。内核的隐身攻击是由通常称为rootkit的恶意软件进行的。 rootkit的目标是隐藏攻击者在受害者系统上的存在。按照惯例,内核rootkit修改了内核以实现隐身,而大多数功能是由随附的用户空间程序提供的。较新的内核rootkit仅通过修改内核数据即可实现恶意和隐身。本文探讨了两种类型的内核rootkit所构成的威胁,并提出了新颖的自动检测和遏制技术。我们的第一项贡献是使用虚拟化体系结构构建的一种自动遏制技术。该技术可抵抗常规内核rootkit对系统造成的持续破坏。它非常适合于采用内核或用户模式隐身但提供大多数恶意功能作为用户空间程序的攻击。我们的第二个贡献是确定对内核的新型隐身攻击,这些隐身攻击没有明显的隐藏行为,但具有明显的隐藏行为。在设计上是隐身的。他们仅通过修改内核中的数据即可实现其恶意目标。这些攻击表明,对内核数据构成的威胁是系统性的,需要全面的保护。;我们的最后贡献是一种新颖的自动化技术,可用于检测这种以数据为中心的隐形攻击。该技术背后的关键思想是在训练阶段自动识别并提取内核数据结构所展现的不变式。这些不变量用作数据结构完整性的规范,并在运行时强制执行。我们的技术可以成功检测所有公开可用的rootkit。它还可以检测到我们开发的或其他最新研究文献提出的最新隐身攻击。

著录项

  • 作者

    Baliga, Arati.;

  • 作者单位

    Rutgers The State University of New Jersey - New Brunswick.;

  • 授予单位 Rutgers The State University of New Jersey - New Brunswick.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2009
  • 页码 118 p.
  • 总页数 118
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 自动化技术、计算机技术;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号