Font Size: a A A

Robust and secure monitoring and attribution of malicious behaviors

Posted on:2012-02-16Degree:Ph.DType:Dissertation
University:Georgia Institute of TechnologyCandidate:Srivastava, AbhinavFull Text:PDF
GTID:1468390011467799Subject:Computer Science
Abstract/Summary:
Worldwide computer systems continue to execute malicious software that degrades the systems' performance and consumes network capacity by generating high volumes of unwanted traffic. Network-based detectors can effectively identify machines participating in the ongoing attacks by monitoring the traffic to and from the systems. But, network detection alone is not enough; it does not improve the operation of the Internet or the health of other machines connected to the network. We must identify malicious code running on infected systems, participating in global attack networks.;This dissertation describes a robust and secure approach that identifies malware present on infected systems based on its undesirable use of network. Our approach, using virtualization, attributes malicious traffic to host-level processes responsible for the traffic. The attribution identifies on-host processes, but malware instances often exhibit parasitic behaviors to subvert the execution of benign processes.;We then augment the attribution software with a host-level monitor that detects parasitic behaviors occurring at the user- and kernel-level. User-level parasitic attack detection happens via the system-call interface because it is a non-bypassable interface for user-level processes. Due to the unavailability of one such interface inside the kernel for drivers, we create a new driver monitoring interface inside the kernel to detect parasitic attacks occurring through this interface.;Our attribution software relies on a guest kernel's data to identify on-host processes. To allow secure attribution, we prevent illegal modifications of critical kernel data from kernel-level malware. Together, our contributions produce a unified research outcome---an improved malicious code identification system for user- and kernel-level malware.
Keywords/Search Tags:Malicious, Attribution, Secure, Monitoring, Systems, Network, Malware
Related items