DocumentCode
950613
Title
Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach
Author
Jiang, Xuxian ; Buchholz, Florian ; Walters, Aaron ; Xu, Dongyan ; Wang, Yi-Min ; Spafford, Eugene H.
Author_Institution
Dept. of Comput. Sci., George Mason Univ., Fairfax, VA
Volume
19
Issue
7
fYear
2008
fDate
7/1/2008 12:00:00 AM
Firstpage
890
Lastpage
902
Abstract
To detect and investigate self-propagating worm attacks against networked servers, the following capabilities are desirable: 1) raising timely alerts to trigger a worm investigation, 2) determining the break-in point of a worm, i.e., the vulnerable service from which the worm infiltrates the victim, and 3) identifying all contaminations inflicted by the worm during its residence in the victim. In this paper, we argue that the worm break-in provenance information has not been exploited in achieving these capabilities and thus propose process coloring, a new approach that preserves worm break-in provenance information and propagates it along operating- system-level information flows. More specifically, process coloring assigns a "color," a unique systemwide identifier, to each remotely accessible server process. The color will be either inherited by spawned child processes or diffused transitively through process actions. Process coloring achieves three new capabilities: color-based worm warning generation, break-in point identification, and log file partitioning. The virtualization-based implementation enables more tamper-resistant log collection, storage, and real-time monitoring. Beyond the overhead introduced by virtualization, process coloring only incurs very small additional system overhead. Experiments with real-world worms demonstrate the advantages of processing coloring over non-provenance-preserving tools.
Keywords
Internet; network servers; operating systems (computers); security of data; color-based worm warning generation; networked servers; process coloring; provenance-preserving approach; real-time monitoring; self-propagating worm attacks; tamper-resistant log collection; virtualization-based implementation; (viruses; Security and Protection; Servers; Trojan horses); worms;
fLanguage
English
Journal_Title
Parallel and Distributed Systems, IEEE Transactions on
Publisher
ieee
ISSN
1045-9219
Type
jour
DOI
10.1109/TPDS.2007.70765
Filename
4359445
Link To Document