packet vaccine: blackbox exploit detection and signature generation authors: xiaofeng wang zhuowei...

14
Packet Vaccine: Blackbox Exploit Detection and Signature Generation Authors: XiaoFeng Wang Zhuowei Li Jong Youl Choi School of Informatics, Indiana University at Bloomington. Jun Xu Google, Inc. Michael K. Reiter Computer Science Department, Electrical & Computer Engineering Department, Carnegie Mellon University Chongkyung Kil Department of Computer Science, North Carolina State University. Presented by: Walaa Akram Anwar

Upload: jocelin-nichols

Post on 27-Dec-2015

213 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Packet Vaccine: Blackbox Exploit Detection and Signature Generation Authors: XiaoFeng Wang Zhuowei Li Jong Youl Choi School of Informatics, Indiana University

Packet Vaccine: Blackbox Exploit Detection and Signature GenerationAuthors:• XiaoFeng Wang• Zhuowei Li• Jong Youl ChoiSchool of Informatics, Indiana University at Bloomington.• Jun XuGoogle, Inc.• Michael K. ReiterComputer Science Department, Electrical & Computer Engineering

Department, Carnegie Mellon University• Chongkyung KilDepartment of Computer Science, North Carolina State University.

Presented by:Walaa Akram Anwar

Page 2: Packet Vaccine: Blackbox Exploit Detection and Signature Generation Authors: XiaoFeng Wang Zhuowei Li Jong Youl Choi School of Informatics, Indiana University

ProblemExploit: An exploit is a piece of software, a chunk

of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized). This frequently includes such things as violently gaining control of a computer system or allowing privilege escalation or a denial of service attack.

Page 3: Packet Vaccine: Blackbox Exploit Detection and Signature Generation Authors: XiaoFeng Wang Zhuowei Li Jong Youl Choi School of Informatics, Indiana University

Related WorkNetwork anomaly detection (NAD) has

been widely used to detect exploit attempts from network traffic.

Earlybird, Honeycomb and Autograph: A typical network signature generators extract common substrings from attack dataflow as an exploit signature.

TaintCheck, VSEF, Vigilante and DACODA: Host-based approaches make use of host information to detect anomalies and generate signatures.

Page 4: Packet Vaccine: Blackbox Exploit Detection and Signature Generation Authors: XiaoFeng Wang Zhuowei Li Jong Youl Choi School of Informatics, Indiana University

Paper SolutionVaccine: is a weakened strain of

a virus or bacterium that is intentionally injected into the body for the purpose of stimulating antibody production.

Page 5: Packet Vaccine: Blackbox Exploit Detection and Signature Generation Authors: XiaoFeng Wang Zhuowei Li Jong Youl Choi School of Informatics, Indiana University

Problem Solution Cont. Vaccine generation is based upon

◦ Detection of anomalous packet payloads, e.g., a byte sequence resembling a jump address.

◦ randomization of selected contents. A vaccine can detect an exploit attempt, since it should

now trigger an exception in a vulnerable program. Vulnerability diagnosis correlates the exception with

the vaccine to acquire information regarding the exploit, in particular the corrupted pointer content and its location in the exploit packet.

Using this information, the signature generation engine creates variations of the original exploit to probe the vulnerable program, in an effort to identify necessary exploit conditions for generation of a signature.

Page 6: Packet Vaccine: Blackbox Exploit Detection and Signature Generation Authors: XiaoFeng Wang Zhuowei Li Jong Youl Choi School of Informatics, Indiana University

Paper Solution Cont.

Correlations

Page 7: Packet Vaccine: Blackbox Exploit Detection and Signature Generation Authors: XiaoFeng Wang Zhuowei Li Jong Youl Choi School of Informatics, Indiana University

Evaluation

Page 8: Packet Vaccine: Blackbox Exploit Detection and Signature Generation Authors: XiaoFeng Wang Zhuowei Li Jong Youl Choi School of Informatics, Indiana University

Evaluation Cont.

Two hosts were used in the experiment◦one for both the proxy and the test

server ◦The other for the web server.

Both were equipped with 2.53GHz Intel Pentium 4 Processor and 1 GB RAM, and running Redhat Enterprise 2.6.9-22.0.1.EL.

They were interconnected through a 100MB switch.

Page 9: Packet Vaccine: Blackbox Exploit Detection and Signature Generation Authors: XiaoFeng Wang Zhuowei Li Jong Youl Choi School of Informatics, Indiana University

Evaluation Cont.the performance of

implementation from the following perspectives: ◦Server overheads, where they

compared the workload capacity of their implementation with that of an unprotected Apache server.

◦Client-side delay, where they studied the average delay a client experiences under different test rates.

Page 10: Packet Vaccine: Blackbox Exploit Detection and Signature Generation Authors: XiaoFeng Wang Zhuowei Li Jong Youl Choi School of Informatics, Indiana University

Evaluation Cont.

(D0) Apache and the proxy on different hosts. 44%(D1) Apache on one host, and the proxy and packet vaccine on another. 29%(S0) Apache and the proxy on the same host. 43%(S1) Apache proxy and packet-vaccine all on the same host. 27%(0) Apache only.

Page 11: Packet Vaccine: Blackbox Exploit Detection and Signature Generation Authors: XiaoFeng Wang Zhuowei Li Jong Youl Choi School of Informatics, Indiana University

Evaluation Cont.

Page 12: Packet Vaccine: Blackbox Exploit Detection and Signature Generation Authors: XiaoFeng Wang Zhuowei Li Jong Youl Choi School of Informatics, Indiana University

Evaluation Cont.The average delay for a local client

increased almost linearly with the test rate. However, this result could be misleading, as the local client experienced much smaller round trip delay (RTD) than an average Internet user.

The RTD in a campus we measured is around 300µs, while the average RTD on the Internet is much larger. Therefore, an Internet client's perception of the presence of packet vaccine could be completely overshadowed by the RTD.

Page 13: Packet Vaccine: Blackbox Exploit Detection and Signature Generation Authors: XiaoFeng Wang Zhuowei Li Jong Youl Choi School of Informatics, Indiana University

ConclusionGray-box analysis is accurate and

applicable to commodity software. However, it incurs significant runtime overheads, often slowing the system by an order of magnitude.

Packet Vaccine: a fast, blackbox technique for exploit detection, vulnerability diagnosis and signature generation.

Page 14: Packet Vaccine: Blackbox Exploit Detection and Signature Generation Authors: XiaoFeng Wang Zhuowei Li Jong Youl Choi School of Informatics, Indiana University

Thank You

14