Rootkit Detection and Mitigation

Slides:



Advertisements
Similar presentations
The System Center Family Microsoft. Mobile Device Manager 2008.
Advertisements

1Copyright © 2005 InfoGard Laboratories Proprietary 2005 Physical Security Conference Physical Security 101 Tom Caddy September 26, 2005.
ROOTKIT VIRUS by Himanshu Mishra Points to be covered Introduction History Uses Classification Installation and Cloaking Detection Removal.
Security Controls – What Works
V.S. Subrahmanian University of Maryland 1 IMPACT: Future Directions (years 3 and 4)
Lecture 13 Revision IMS Systems Analysis and Design.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Vijay krishnan Avinesh Dupat  Collection of tools (programs) that enable administrator-level access to a computer or computer network.  The main purpose.
Chapter 9 Database Design
DECISION SUPPORT SYSTEM DEVELOPMENT
8 Systems Analysis and Design in a Changing World, Fifth Edition.
Software Issues Derived from Dr. Fawcett’s Slides Phil Pratt-Szeliga Fall 2009.
Installing software on personal computer
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Intrusion Detection System Marmagna Desai [ 520 Presentation]
Agenda Master Expert Associat e Microsoft Certified Solutions Master (MCSM) Microsoft Certified Solutions Expert (MCSE) Microsoft Certified Solutions.
Norman SecureSurf Protect your users when surfing the Internet.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
VMM Based Rootkit Detection on Android Class Presentation Pete Bohman, Adam Kunk, Erik Shaw.
SEC835 Database and Web application security Information Security Architecture.
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
Information Systems Security Computer System Life Cycle Security.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
System Development Process Prof. Sujata Rao. 2Overview Systems development life cycle (SDLC) – Provides overall framework for managing system development.
An Introduction to IBM Systems Director
Vijay Krishnan Avinesh Dupat. A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators.
Copyright © 2011 EMC Corporation. All Rights Reserved. MODULE – 6 VIRTUALIZED DATA CENTER – DESKTOP AND APPLICATION 1.
IST 210 Database Design Process IST 210 Todd S. Bacastow January 2005.
1 Chapter 9 Database Design. 2 2 In this chapter, you will learn: That successful database design must reflect the information system of which the database.
Eric Keller, Evan Green Princeton University PRESTO /22/08 Virtualizing the Data Plane Through Source Code Merging.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Chapter 10 Information Systems Analysis and Design
Oracle9i Performance Tuning Chapter 1 Performance Tuning Overview.
OBJECT ORIENTED SYSTEM ANALYSIS AND DESIGN. COURSE OUTLINE The world of the Information Systems Analyst Approaches to System Development The Analyst as.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
VMM Based Rootkit Detection on Android Class Presentation Pete Bohman, Adam Kunk, Erik Shaw.
Virtual Workspaces Kate Keahey Argonne National Laboratory.
Computer Concepts 2014 Chapter 10 Information Systems Analysis and Design.
Security in Cloud Computing Zac Douglass Chris Kahn.
Project Name Program Name Project Scope Title Project Code and Name Insert Project Branding Image Here.
Principles of Information Systems, Sixth Edition 1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Security Vulnerabilities in A Virtual Environment
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Architecture View Models A model is a complete, simplified description of a system from a particular perspective or viewpoint. There is no single view.
Overview-TPV Service Delivery
Chapter 8 System Management Semester 2. Objectives  Evaluating an operating system  Cooperation among components  The role of memory, processor,
VMM Based Rootkit Detection on Android
Mark Shtern.  Our life depends on computer systems  Traffic control  Banking  Medical equipment  Internet  Social networks  Growing number of.
 Has computer technology knowledge and programming expertise  Understands business problems  Uses logical methods for solving problems  Has fundamental.
User Mode Linux (UML): An overview and experiences. Matthew Grove SLUG Tech Talk Red Hat Europe 12 th January 2007.
11/03/2016.
Systems Analysis and Design in a Changing World, Fifth Edition
Let's talk about Linux and Virtualization in 'vLAMP'
Business System Development
SY0-401 Exam Dumps CompTIA Security+ Certification Exam
Information Systems Supports Business processes
Virtualization Layer Virtual Hardware Virtual Networking
Gathering Systems Requirements
What’s new in the Fall Creators Update for Windows Defender ATP
Operating System Security
Cloud Computing LegalRun Solutions Why It’s Right for You!
Internet Engineering Course
Gathering Systems Requirements
Security in Cloud Computing
Counter APT Counter APT HUNT operations combine best of breed endpoint detection response technology with an experienced cadre of cybersecurity experts.
Productive + Hybrid + Intelligent + Trusted
Presentation transcript:

Rootkit Detection and Mitigation Project Outbrief DARPA Contract N66001-06-C-2052 April 26, 2007

Summary Conclusions and Recommendations Best current approach is tailored detection Best current approach only detects known rootkits and techniques No current detection of unknown or new rootkits and techniques Solution: Collect evidence related to induced and passive indirect effects Collect evidence from multiple perspectives Probabilistic reasoning over evidence

Project Overview Purpose: Establish current state of rootkits and detection Project future state of rootkits and detection Identify promising solutions Approach: Collect and study rootkit samples Empirically test current detection methods Discussion with experts and practitioners Research emerging rootkits and detection approaches Propose solution

+ Threat Remote access to compromised systems and data Difficult to detect = Sensitive processing on compromised computers Statistics: ~100 entities conducting espionage against the U.S. Nine documented cases of corporate espionage Data theft accounts for 80% of cybercrime 46% of companies do not keep current on application patches Motive: Financial, strategic, military, political Means: Wide availability of tools Opportunity: Vulnerable systems, network connectivity

Current State Rootkits: Kernel mode drivers to provide functionality and stealth Prevention: Patch maintenance and standard security practices Detection: Tailored detection, cross view differences Mitigation: Full system containment Recovery: Restore known good (surgical recovery rare)

Detection Testing

Detection Testing: Alternate View

Detection Testing: Scored and Sorted

Future State Rootkits: Direct injection, plain sight, virtual machines Locations, platforms Distributed and cooperating Prevention: Signed code Detection: Multiple tailored methods, cross-view diffs and variations Mitigation: Selected mitigation possible Recovery: Virtual machine images, surgical restore possible

Solution Overview Required properties: Detect indirect rootkit effects Collect evidence from multiple perspectives Advanced evidence marshalling and reasoning Solution: Evidence collection as a suite of tests (induced and passive) Host agent to execute evidence collection Agent operates at five different levels Multi-Entity Bayesian Network to reason over evidence

Evidence Collection Tests Designed to detect indirect effects of rootkits Examples: Hidden process PID Hidden process memory footprint Data tracing

Host Agent Implemented as a virtual machine byte code interpreter: VM Interpreter Tests (evidence collection) are byte code sequences Other actions Advantages: Detection resistant Small footprint Verifiable integrity Views of system and data at different perspectives Extensible Cross platform

Multiple Levels Five levels (perspectives): Remote collection User-level tools Visible kernel driver Detection-resistant kernel driver Hardware device

Evidence Reasoning Multi-Entity Bayesian Network Collections of indicators as network fragments Logic to join fragments when evidence is received Local or remote Executes continuously Output: Likelihood of rootkit presence Reasoning chain Supporting evidence Contrarian evidence Additional evidence

Evaluation Develop variant and new rootkits (i.e., create “unknown” rootkits) Empirical testing against known and unknown rootkits Test deployments (truly unknown rootkits)

Solution Architecture

Concept of Operations Agent installation Detection mode Configurable Reasoner alert Analyst: Additional library tests Custom tests Collect data Take mitigation actions

Solution Development Phase 1: Tailored detection tool 6 months - $600k Optional Phase 2: Proof of Concept 6 months - $450k Concurrent with Phase 1 Phase 3: Functional Implementation 18 months - $2.7M After Phase 2 Phase 4: Extensions and Enhancements 12 months - $900k After Phase 3

Team SAIC: Rootkits, probabilistic reasoning, operational knowledge HBGary: Rootkits, agent IET: Probabilistic reasoning Northrup Grumman/TASC: Rootkits, operational knowledge

Discussion and Next Steps