DocumentCode :
2171292
Title :
New directions in covert malware modeling which exploit white-listing
Author :
Wang, Jisheng ; Kesidis, George ; Miller, David J.
Author_Institution :
Dept. of EE&CSE, Penn State Univ., University Park, PA
fYear :
2007
fDate :
April 30 2007-May 2 2007
Firstpage :
1
Lastpage :
7
Abstract :
Zero-day attacks - especially those that hide the attack exploit by using code obfuscation and encryption - remain a formidable challenge to existing network defenses. Many techniques have been developed that can address known attacks and similar new attacks that may arise in the future. Some methods, like Earlybird and Polygraph, focus on string-based content prevalence in payloads; others focus on the presence of particular I386 instructions, e.g., Sigfree counts the number of ldquousefulrdquo instructions in each request. For both types of systems, a white-listing mechanism, in which some strings or instructions are regarded as innocuous, is necessary to avoid a high false positive rate associated with common content such as URL addresses and peer-to-peer traffic. In this paper, we explore a more sophisticated attack model that not only makes malcode payloads look like nominal ones, but which is also assumed to be both aware of and exploitative of the white-listing itself in forming a Trojan mechanism. In other words, the malware attempts to embed its malcode into the prevalent content that is normally white-listed. If the malcode is encrypted, the attacker will also attempt to obfuscate its plain-text decryption code as much as possible. Both current string-based and instructionbased systems will likely fail to detect such attacks. We propose a comprehensive IDS model in the paper and discuss some potential defensive mechanisms against such attack.
Keywords :
cryptography; invasive software; peer-to-peer computing; telecommunication security; telecommunication traffic; tree data structures; IDS model; Trojan mechanism; URL addresses; code obfuscation; covert malware modeling; encryption; generalized suffix tree; network defenses; payload-based detection; peer-to-peer traffic; string-based content prevalence; white-listing mechanism; zero-day attacks; Computer networks; Computer worms; Cryptography; Distributed computing; Electronic mail; Embedded computing; Humans; Intrusion detection; Military computing; Payloads;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Sarnoff Symposium, 2007 IEEE
Conference_Location :
Nassau Inn, Princeton, NJ
Print_ISBN :
978-1-4244-2483-2
Type :
conf
DOI :
10.1109/SARNOF.2007.4567340
Filename :
4567340
Link To Document :
بازگشت