Mimicry Attacks on Host- Based Intrusion Detection David Wagner Paolo Soto University of California at Berkeley.

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Advertisements

Loss-Sensitive Decision Rules for Intrusion Detection and Response Linda Zhao Statistics Department University of Pennsylvania Joint work with I. Lee,
ROP is Still Dangerous: Breaking Modern Defenses Nicholas Carlini et. al University of California, Berkeley USENIX Security 2014 Presenter: Yue Li Part.
12-1 Last time Security in Networks Threats in Networks.
1 Detection of Injected, Dynamically Generated, and Obfuscated Malicious Code (DOME) Subha Ramanathan & Arun Krishnamurthy Nov 15, 2005.
On the Hardness of Evading Combinations of Linear Classifiers Daniel Lowd University of Oregon Joint work with David Stevens.
Lecture 1: Overview modified from slides of Lawrie Brown.
Polymorphic blending attacks Prahlad Fogla et al USENIX 2006 Presented By Himanshu Pagey.
Cyber Threat Analysis  Intrusions are actions that attempt to bypass security mechanisms of computer systems  Intrusions are caused by:  Attackers accessing.
Introduction to Cryptography and Security Mechanisms: Unit 5 Theoretical v Practical Security Dr Keith Martin McCrea
Intrusion Detection Systems and Practices
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Asymmetric Cryptography part 1 & 2 Haya Shulman Many thanks to Amir Herzberg who donated some of the slides from
Unsupervised Intrusion Detection Using Clustering Approach Muhammet Kabukçu Sefa Kılıç Ferhat Kutlu Teoman Toraman 1/29.
MOPS MOdelchecking Security Properties David Wagner U.C. Berkeley.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
What Makes for a Successful Protocol? Presented By: Nigel Medforth.
Mining Behavior Models Wenke Lee College of Computing Georgia Institute of Technology.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
IBM Security Network Protection (XGS)
seminar on Intrusion detection system
Foundations of Network and Computer Security J J ohn Black Lecture #26 Dec 2 nd 2004 CSCI 6268/TLEN 5831, Fall 2004.
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
Department Of Computer Engineering
Building Survivable Systems based on Intrusion Detection and Damage Containment Paper by: T. Bowen Presented by: Tiyseer Al Homaiyd 1.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Antivirus Software Detects malware (not just viruses) May eliminate malware as well Often sold with firewalls Two approaches: Dictionary-based - Compares.
1. Introduction Generally Intrusion Detection Systems (IDSs), as special-purpose devices to detect network anomalies and attacks, are using two approaches.
The Impact of Programming Language Theory on Computer Security Drew Dean Computer Science Laboratory SRI International.
Intrusion Detection Systems Present by Ali Fanian In the Name of Allah.
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal.
Intrusion Detection Presentation : 1 OF n by Manish Mehta 01/24/03.
Improving Intrusion Detection System Taminee Shinasharkey CS689 11/2/00.
BY ANDREA ALMEIDA T.E COMP DON BOSCO COLLEGE OF ENGINEERING.
Security Evaluation of Pattern Classifiers under Attack.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Carnegie Mellon Selected Topics in Automated Diversity Stephanie Forrest University of New Mexico Mike Reiter Dawn Song Carnegie Mellon University.
23-aug-05Intrusion detection system1. 23-aug-05Intrusion detection system2 Overview of intrusion detection system What is intrusion? What is intrusion.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
Roberto Paleari,Universit`a degli Studi di Milano Lorenzo Martignoni,Universit`a degli Studi di Udine Emanuele Passerini,Universit`a degli Studi di Milano.
Jeremy Kackley, James Jacobs, Paulus Wahjudi and Jean Gourd.
Detecting Targeted Attacks Using Shadow Honeypots Authors: K.G. Anagnostakis, S. Sidiroglou, P. Akritidis, K. Xinidis, E. Markatos, A.D. Keromytis Published:
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
IEEE Communications Surveys & Tutorials 1st Quarter 2008.
SNORT Biopsy: A Forensic Analysis on Intrusion Detection System By Asif Syed Chowdhury.
.  Define risk and risk management  Describe the components of risk management  List and describe vulnerability scanning tools  Define penetration.
Intrusion Detection System (IDS) Basics LTJG Lemuel S. Lawrence Presentation for IS Sept 2004.
Intrusion Detection System (IDS). What Is Intrusion Detection Intrusion Detection is the process of identifying and responding to malicious activity targeted.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Detecting Evasion Attack at High Speed without Reassembly.
Cryptography and Network Security Sixth Edition by William Stallings.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Intrusion Detection System
Automated Worm Fingerprinting Authors: Sumeet Singh, Cristian Estan, George Varghese and Stefan Savage Publish: OSDI'04. Presenter: YanYan Wang.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Intrusion and intrusion detection Published online 27 July 2001 by John McHugh, © Springer-Verlag 2001 Presented by Po-yuan Peng.
Design Lines for a Long Term Competitive IDS Erwan Lemonnier KTH-IT / Defcom.
Hiding Intrusions : From the Abnormal to the Normal and Beyond Kymie Tan, John McHugh and Kevin Killourhy Presented in 5 th Information Hiding Workshop,
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
DIVYA K 1RN09IS016 RNSIT1. Cloud computing provides a framework for supporting end users easily through internet. One of the security issues is how to.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Some Great Open Source Intrusion Detection Systems (IDSs)
Intrusion Detection Systems Dj Gerena. What is an Intrusion Detection System Hardware and/or software Attempts to detect Intrusions Heuristics /Statistics.
HIPS. Host-Based Intrusion Prevention Systems  One of the major benefits to HIPS technology is the ability to identify and stop known and unknown attacks,
Application Communities
Principles of Computer Security
Detecting Attacks Against Robotic Vehicles:
Presentation transcript:

Mimicry Attacks on Host- Based Intrusion Detection David Wagner Paolo Soto University of California at Berkeley

Preview The topic of this talk: How do we evaluate the security of a host-based IDS against sophisticated attempts to evade detection? One answer: “adversarial scholarship”

The Cryptographer’s Creed Conservative design Systems should be evaluated by the worst failure that is at all plausible under assumptions favorable to the attacker * * Credits: Gwyn Kerkhoff’s principle Systems should remain secure even when the attacker knows all internal details of the system The study of attacks We should devote considerable effort to trying to break our own systems; this is how we gain confidence in their security

The Stakes The risk of ignoring attacks: Consider virus scanners Widely deployed despite possible evasion attacks Yet polymorphic and stealthy viruses soon appeared in the wild  The result: An arms race

Research Into Attacks We could benefit from a stronger tradition of research into potential attacks on intrusion detection DesignAttacks Block ciphers Intrusion detection Table 1. Papers published in the past five years, by subject

Research Into Attacks We could benefit from a stronger tradition of research into attacks on intrusion detection DesignAttacks Block ciphers Intrusion detection Table 1. Papers published in the past five years, by subject

Research Into Attacks Block ciphersIntrusion detection Table 1. Papers published in the past five years, by subject. We could benefit from a stronger tradition of research into potential attacks on intrusion detection

In This Talk… Organization of this talk: Host-based intrusion detection Mimicry attacks, and how to find them Attacking pH, a host-based IDS Concluding thoughts How do we evaluate the security of a host-based IDS against sophisticated attempts to evade detection?

Host-based Intrusion Detection Anomaly detection: IDS monitors system call trace from the app DB contains a list of subtraces that are allowed to appear Any observed subtrace not in DB sets off alarms App allowed traces IDS Operating System

The Mimicry Attack 1. Take control of the app. e.g., by a buffer overrun App allowed traces IDS Operating System malicious payload 2. Execute payload while mimicking normal app behavior. If exploit sequence contains only allowed subtraces, the intrusion will remain undetected.

When Are Attacks Possible? The central question for mimicry attacks: Can we craft an exploit sequence out of only allowed subtraces and still cause any harm? Assumptions: IDS algorithm + DB is known to attacker [Kerkhoff ] Can take control of app undetected [Conservative design ]

Disguising the Payload Attacker has many degrees of freedom: Wait until malicious payload would be allowed Vary the malicious payload by adding no-ops e.g., (void) getpid() or open(NULL,0) In fact, nearly all syscalls can be turned into no-ops Note: the set of choices can be expressed as a regexp Let N denote the set of no-op-able syscalls Then open() write() can be replaced by anything matching N * open() N * write() N *

A Theoretical Framework Definitions: Σ denotes the set of syscalls; M = {T  Σ * : the malicious trace T does damage}; A = {T  Σ * : T is allowed by the IDS} An undetected malicious sequence exists iff M  A  Ø Testing for mimicry attacks reduces to automata theory IDS’s are typically finite-state  A given by a FSA Hence, M and A are typically regular languages, and then we can efficiently check whether M  A  Ø

To check whether there is a mimicry attack: Let Σ = set of security-relevant events, M = set of “bad” traces that do damage to the system, A = set of traces allowed by the IDS ( M, A  Σ*) If M  A  Ø, then there is a mimicry attack A Theoretical Framework A M

To check whether there is a mimicry attack: Let Σ = set of security-relevant events, M = set of “bad” traces that do damage to the system, A = set of traces allowed by the IDS ( M, A  Σ*) If M  A  Ø, then there is a mimicry attack Then just apply automata theory M : regular expression (regular language) A : finite-state system (regular language) Works since IDS’s are typically just finite-state machines A Theoretical Framework A M

Experience: Mimicry in Action The experiment: pH: a host-based IDS [SF00] autowux: a wuftpd exploit No mimicry attacks with the original payload … but, after a slight modification …

A Successful Mimicry Attack We found a modified payload that raises no alarms and has a similar effect on the system  pH may be at risk for mimicry attacks

Conclusions Mimicry attacks: A threat to host-based IDS? Practical implications not known The study of attacks is important Unfortunately, there’s so much we don’t know…