Presentation is loading. Please wait.

Presentation is loading. Please wait.

Packet Vaccine: Blackbox Exploit Detection and Signature Generation Authors: XiaoFeng Wang Zhuowei Li Jong Youl Choi School of Informatics, Indiana University.

Similar presentations


Presentation on theme: "Packet Vaccine: Blackbox Exploit Detection and Signature Generation Authors: XiaoFeng Wang Zhuowei Li Jong Youl Choi School of Informatics, Indiana University."— Presentation transcript:

1 Packet Vaccine: Blackbox Exploit Detection and Signature Generation Authors: XiaoFeng Wang Zhuowei Li Jong Youl Choi School of Informatics, Indiana University at Bloomington. Jun Xu Google, Inc. Michael K. Reiter Computer Science Department, Electrical & Computer Engineering Department, Carnegie Mellon University Chongkyung Kil Department of Computer Science, North Carolina State University. Presented by: Walaa Akram Anwar

2 Problem Exploit: An exploit is a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized). This frequently includes such things as violently gaining control of a computer system or allowing privilege escalation or a denial of service attack.

3 Related Work Network anomaly detection (NAD) has been widely used to detect exploit attempts from network traffic. Earlybird, Honeycomb and Autograph: A typical network signature generators extract common substrings from attack dataflow as an exploit signature. TaintCheck, VSEF, Vigilante and DACODA: Host-based approaches make use of host information to detect anomalies and generate signatures.

4 Paper Solution Vaccine: is a weakened strain of a virus or bacterium that is intentionally injected into the body for the purpose of stimulating antibody production.

5 Problem Solution Cont. Vaccine generation is based upon ◦ Detection of anomalous packet payloads, e.g., a byte sequence resembling a jump address. ◦ randomization of selected contents. A vaccine can detect an exploit attempt, since it should now trigger an exception in a vulnerable program. Vulnerability diagnosis correlates the exception with the vaccine to acquire information regarding the exploit, in particular the corrupted pointer content and its location in the exploit packet. Using this information, the signature generation engine creates variations of the original exploit to probe the vulnerable program, in an effort to identify necessary exploit conditions for generation of a signature.

6 Paper Solution Cont. Correlations

7 Evaluation

8 Evaluation Cont. Two hosts were used in the experiment ◦ one for both the proxy and the test server ◦ The other for the web server. Both were equipped with 2.53GHz Intel Pentium 4 Processor and 1 GB RAM, and running Redhat Enterprise 2.6.9-22.0.1.EL. They were interconnected through a 100MB switch.

9 Evaluation Cont. the performance of implementation from the following perspectives: ◦ Server overheads, where they compared the workload capacity of their implementation with that of an unprotected Apache server. ◦ Client-side delay, where they studied the average delay a client experiences under different test rates.

10 Evaluation Cont. (D0) Apache and the proxy on different hosts. 44% (D1) Apache on one host, and the proxy and packet vaccine on another. 29% (S0) Apache and the proxy on the same host. 43% (S1) Apache proxy and packet-vaccine all on the same host. 27% (0) Apache only.

11 Evaluation Cont.

12 The average delay for a local client increased almost linearly with the test rate. However, this result could be misleading, as the local client experienced much smaller round trip delay (RTD) than an average Internet user. The RTD in a campus we measured is around 300µs, while the average RTD on the Internet is much larger. Therefore, an Internet client's perception of the presence of packet vaccine could be completely overshadowed by the RTD.

13 Conclusion Gray-box analysis is accurate and applicable to commodity software. However, it incurs significant runtime overheads, often slowing the system by an order of magnitude. Packet Vaccine: a fast, blackbox technique for exploit detection, vulnerability diagnosis and signature generation.

14 Thank You 14


Download ppt "Packet Vaccine: Blackbox Exploit Detection and Signature Generation Authors: XiaoFeng Wang Zhuowei Li Jong Youl Choi School of Informatics, Indiana University."

Similar presentations


Ads by Google