• DocumentCode
    950613
  • Title

    Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach

  • Author

    Jiang, Xuxian ; Buchholz, Florian ; Walters, Aaron ; Xu, Dongyan ; Wang, Yi-Min ; Spafford, Eugene H.

  • Author_Institution
    Dept. of Comput. Sci., George Mason Univ., Fairfax, VA
  • Volume
    19
  • Issue
    7
  • fYear
    2008
  • fDate
    7/1/2008 12:00:00 AM
  • Firstpage
    890
  • Lastpage
    902
  • Abstract
    To detect and investigate self-propagating worm attacks against networked servers, the following capabilities are desirable: 1) raising timely alerts to trigger a worm investigation, 2) determining the break-in point of a worm, i.e., the vulnerable service from which the worm infiltrates the victim, and 3) identifying all contaminations inflicted by the worm during its residence in the victim. In this paper, we argue that the worm break-in provenance information has not been exploited in achieving these capabilities and thus propose process coloring, a new approach that preserves worm break-in provenance information and propagates it along operating- system-level information flows. More specifically, process coloring assigns a "color," a unique systemwide identifier, to each remotely accessible server process. The color will be either inherited by spawned child processes or diffused transitively through process actions. Process coloring achieves three new capabilities: color-based worm warning generation, break-in point identification, and log file partitioning. The virtualization-based implementation enables more tamper-resistant log collection, storage, and real-time monitoring. Beyond the overhead introduced by virtualization, process coloring only incurs very small additional system overhead. Experiments with real-world worms demonstrate the advantages of processing coloring over non-provenance-preserving tools.
  • Keywords
    Internet; network servers; operating systems (computers); security of data; color-based worm warning generation; networked servers; process coloring; provenance-preserving approach; real-time monitoring; self-propagating worm attacks; tamper-resistant log collection; virtualization-based implementation; (viruses; Security and Protection; Servers; Trojan horses); worms;
  • fLanguage
    English
  • Journal_Title
    Parallel and Distributed Systems, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1045-9219
  • Type

    jour

  • DOI
    10.1109/TPDS.2007.70765
  • Filename
    4359445