Application Recognition Sam Larsen Determina. Process Control One method to improve computer security is through process control  Whitelist: user specifies.

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Advertisements

Sensor-Based Abnormal Human-Activity Detection Authors: Jie Yin, Qiang Yang, and Jeffrey Junfeng Pan Presenter: Raghu Rangan.
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
Overview Motivations Basic static and dynamic optimization methods ADAPT Dynamo.
Honeypot 서울과학기술대학교 Jeilyn Molina Honeypot is the software or set of computers that are intended to attract attackers, pretending to be weak.
Tailoring Needs Chapter 3. Contents This presentation covers the following: – Design considerations for tailored data-entry screens – Design considerations.
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 10 04/18/2011 Security and Privacy in Cloud Computing.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
seminar on Intrusion detection system
Maintaining and Updating Windows Server 2008
Present by Napasakorn Sukjay Poom Samaharn
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
Building Survivable Systems based on Intrusion Detection and Damage Containment Paper by: T. Bowen Presented by: Tiyseer Al Homaiyd 1.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Virtual Memory Tuning   You can improve a server’s performance by optimizing the way the paging file is used   You may want to size the paging file.
Antivirus Software Detects malware (not just viruses) May eliminate malware as well Often sold with firewalls Two approaches: Dictionary-based - Compares.
Chapter 17: Watching Your System BAI617. Chapter Topics Working With Event Viewer Performance Monitor Resource Monitor.
Success status, page 1 Collaborative learning for security and repair in application communities MIT & Determina AC PI meeting July 10, 2007 Milestones.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Hacker Zombie Computer Reflectors Target.
Signature Based and Anomaly Based Network Intrusion Detection
Michael Ernst, page 1 Collaborative Learning for Security and Repair in Application Communities Performers: MIT and Determina Michael Ernst MIT Computer.
Behavior-based Spyware Detection By Engin Kirda and Christopher Kruegel Secure Systems Lab Technical University Vienna Greg Banks, Giovanni Vigna, and.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
Honeypot and Intrusion Detection System
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
1.2 Security. Computer security is a branch of technology known as information security, it is applied to computers and networks. It is used to protect.
Carnegie Mellon Selected Topics in Automated Diversity Stephanie Forrest University of New Mexico Mike Reiter Dawn Song Carnegie Mellon University.
23-aug-05Intrusion detection system1. 23-aug-05Intrusion detection system2 Overview of intrusion detection system What is intrusion? What is intrusion.
Towards Low Overhead Provenance Tracking in Near Real-Time Stream Filtering Nithya N. Vijayakumar, Beth Plale DDE Lab, Indiana University {nvijayak,
Quasi-Static Binary Analysis Hassen Saidi. Quasi-Static Analysis in VERNIER Node level: –Quasi-static analysis is a detector of malicious and bad behavior.
Created By Shanon Moss.  The Mozilla Firefox project was created by Dave Hyatt and Blake Ross as an experimental branch of the Mozilla project. Firefox.
Identification of Bot Commands By Run-time Execution Monitoring Younghee Park, Douglas S. Reeves North Carolina State University ACSAC
Automatically Generating Models for Botnet Detection Presenter: 葉倚任 Authors: Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan Goebel, Christopher Kruegel,
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #23 Biometrics Standards - II November 14, 2005.
Determina DARPA PI meeting Page 2Confidential © Determina, Inc. Agenda LiveShield –Product and Technology –Current Status Applications to Application.
Section 11: Implementing Software Restriction Policies and AppLocker What Is a Software Restriction Policy? Creating a Software Restriction Policy Using.
Environment Selection Application  Firefox 1.0 or 2.0  Apache Operating System  Linux  Windows XP Instrumentation Package  JIT (DynamoRio,
NT SECURITY Introduction Security features of an operating system revolve around the principles of “Availability,” “Integrity,” and Confidentiality. For.
37 Copyright © 2007, Oracle. All rights reserved. Module 37: Executing Workflow Processes Siebel 8.0 Essentials.
Module 7: Advanced Application and Web Filtering.
OARN Database UPDATE – SEPTEMBER We’re Live – and Testing  The site is up and running in Google’s data centers:  The site has been secured: 
November 19, 2008 CSC 682 Use of Virtualization to Thwart Malware Written by: Ryan Lehan Presented by: Ryan Lehan Directed By: Ryan Lehan Produced By:
CISC Machine Learning for Solving Systems Problems Presented by: Suman Chander B Dept of Computer & Information Sciences University of Delaware Automatic.
Homework tar file Download your course tarball from web page – Named using your PSU ID – Chapter labeled for each binary.
Cryptography and Network Security Sixth Edition by William Stallings.
Full and Para Virtualization
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Intrusion Detection System
Understand Audit Policies LESSON Security Fundamentals.
Exploiting Instruction Streams To Prevent Intrusion Milena Milenkovic.
PROGRAMMING TESTING B MODULE 2: SOFTWARE SYSTEMS 22 NOVEMBER 2013.
Application Hosting and Customization Introducing Sandboxed Solutions Executing Code in the Sandbox Sandbox Resource Monitoring.
MIT/Determina Application Communities, page 1 Approved for Public Release, Distribution Unlimited - Case 9649 Collaborative learning for security and repair.
Collaborative learning for security and repair in application communities MIT site visit April 10, 2007 Conclusion.
Chapter 7: Delivery, Installation, and Documentation Ronald J. Leach Copyright Ronald J. Leach, 1997, 2009, 2014,
Maintaining and Updating Windows Server 2008 Lesson 8.
Cosc 4765 Antivirus Approaches. In a Perfect world The best solution to viruses and worms to prevent infected the system –Generally considered impossible.
Some Great Open Source Intrusion Detection Systems (IDSs)
HIPS. Host-Based Intrusion Prevention Systems  One of the major benefits to HIPS technology is the ability to identify and stop known and unknown attacks,
Sophos Intercept X Matt Cooke – Senior Product Marketing Manager.
Application Communities
Active Cyber Security, OnDemand
Outline Introduction Characteristics of intrusion detection systems
Securing Cloud-Native Applications Jason Schmitt CEO
Malware and how to defend against it
Presentation transcript:

Application Recognition Sam Larsen Determina

Process Control One method to improve computer security is through process control  Whitelist: user specifies what is allowed to run  Blacklist: user specifies what is not allowed to run Strong customer interest Disadvantages:  Difficult to administrate  Hackers are learning to circumvent

The Pesky Gray Many applications won’t be black or white Whitelist: a lot of work for the administrator  Currently, we identify applications via a checksum  New software introduces a new checksum  Every new upgrade/patch requires intervention Blacklist: circumvention is getting common  Bad guys now create custom binaries just for you! Small modifications defeat checksums  Many malware payloads are encrypted

Application Recognition Can we automatically recognize a different version of a known application? Migrate to blacklist/whitelist with little or no user intervention Malware identification  Hackers are lazy: families of malware derived from the same code base

Approach Observe runtime program behavior  Indirect branches pose no problem to analysis  Focus on the code that actually executes  Handle self-unpacking binaries  Potentially, observe runtime data Apps derived from the same codebase should have similar runtime behavior  Different apps should have different behavior First attempt: characterize an application by the stream of system calls it generates

Rationale for System Calls System calls are the important events Nearly identical binaries should generate nearly identical traces  Factor out small code changes Low runtime overhead  Only take action at system calls

Application Communities Application identification is most useful in an application community Community data can be aggregated to form more complete application signatures Once an application is recognized, it can be approved or disapproved for everyone  Prevent harm for most community members  Eliminate most of the overhead of recognition

Initial Experimental Results Use DR to capture system call traces Build database of all sequences of N calls  Example: For N=2 and sequence ABCD → AB, BC, CD Measure of similarity between two apps: T - d T T = # unique sequences across both apps d = # sequences in one and not the other

Firefox N = 2 N = 3 N = 4

Firefox N = 2 N = 3 N = 4

Apache N = 2 N = 3 N = 4

Apache N = 2 N = 3 N = 4

Gaim N = 2 N = 3 N = 4

Gaim N = 2 N = 3 N = 4

Traces of API calls Windows API is the primary system interface for windows apps More sensible to track sequences of API calls At system call, examine the call stack to find the outermost API call  If not possible, default to system call

Firefox N = 2 N = 3 N = 4

Firefox N = 2 N = 3 N = 4

Apache N = 2 N = 3 N = 4

Apache N = 2 N = 3 N = 4

Gaim N = 2 N = 3 N = 4

Gaim N = 2 N = 3 N = 4

Comparison with Traditional HIPS Syscall-based intrusion detection/prevention  [Forrest & Hofmeyr]  Record traces during training, then monitor and compare in deployment  Problem with false positives Syscall-based application recognition  Looking at general trends, thus some noise can be tolerated  false positives not an issue  More practical use of system call traces

Next Steps Gather data for more applications  How can we match applications that make few system calls (e.g., calc)? Compare families of malware Build a sandbox?  Malicious code may be recognized too late