Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/945445.945467acmconferencesArticle/Chapter ViewAbstractPublication PagessospConference Proceedingsconference-collections
Article

Backtracking intrusions

Published:19 October 2003Publication History

ABSTRACT

Analyzing intrusions today is an arduous, largely manual task because system administrators lack the information and tools needed to understand easily the sequence of steps that occurred in an attack. The goal of BackTracker is to identify automatically potential sequences of steps that occurred in an intrusion. Starting with a single detection point (e.g., a suspicious file), BackTracker identifies files and processes that could have affected that detection point and displays chains of events in a dependency graph. We use BackTracker to analyze several real attacks against computers that we set up as honeypots. In each case, BackTracker is able to highlight effectively the entry point used to gain access to the system and the sequence of steps from that entry point to the point at which we noticed the intrusion. The logging required to support BackTracker added 9% overhead in running time and generated 1.2 GB per day of log data for an operating-system intensive workload.

References

  1. Steps for Recovering from a UNIX or NT System Compromise. Technical report, CERT Coordination Center, April 2000. http://www.cert.org/tech_tips/ win-UNIX-system_compromise.html.]]Google ScholarGoogle Scholar
  2. Detecting Signs of Intrusion. Technical Report CMU/SEI-SIM-009, CERT Coordination Center, April 2001. http://www.cert.org/security-improvement/modules/m09.html.]]Google ScholarGoogle Scholar
  3. L-133: Sendmail Debugger Arbitrary Code Execution Vulnerability. Technical report, Computer Incident Advisory Capability, August 2001. http://www.ciac.org/ciac/bulletins/l-133.shtml.]]Google ScholarGoogle Scholar
  4. CERT/CC Overview Incident and Vulnerability Trends. Technical report, CERT Coordination Center, April 2002. http://www.cert.org/present/cert-overview-trends/.]]Google ScholarGoogle Scholar
  5. Multiple Vulnerabilities In OpenSSL. Technical Report CERT Advisory CA-2002-23, CERT Coordination Center, July 2002. http://www.cert.org/advisories/CA-2002-23.html.]]Google ScholarGoogle Scholar
  6. Paul Ammann, Sushil Jajodia, and Peng Liu. Recovery from Malicious Transactions. IEEE Transactions on Knowledge and Data Engineering, 14(5):1167--1185, September 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Ken Ashcraft and Dawson Engler. Using Programmer-Written Compiler Extensions to Catch Security Holes. In Proceedings of the 2002 IEEE Symposium on Security and Privacy, May 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Kerstin Buchacker and Volkmar Sieh. Framework for testing the fault-tolerance of systems including OS and network aspects. In Proceedings of the 2001 IEEE Symposium on High Assurance System Engineering (HASE), pages 95--105, October 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Bill Cheswick. An Evening with Berferd in Which a Cracker is Lured, Endured, and Studied. In Proceedings of the Winter 1992 USENIX Technical Conference, pages 163--174, January 1992.]]Google ScholarGoogle Scholar
  10. Alan M. Christie. The Incident Detection, Analysis, and Response (IDAR) Project. Technical report, CERT Coordination Center, July 2002. http://www.cert.org/idar.]]Google ScholarGoogle Scholar
  11. Dorothy E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236--243, May 1976.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. George W. Dunlap, Samuel T. King, Sukru Cinar, Murtaza Basrai, and Peter M. Chen. ReVirt: Enabling Intrusion Analysis through Virtual-Machine Logging and Replay. In Proceedings of the 2002 Symposium on Operating Systems Design and Implementation (OSDI), pages 211--224, December 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Dan Farmer. What are MACtimes? Dr. Dobb's Journal, October 2000.]]Google ScholarGoogle Scholar
  14. Dan Farmer. Bring out your dead. Dr. Dobb's Journal, January 2001.]]Google ScholarGoogle Scholar
  15. Dan Farmer and Wietse Venema. Forensic computer analysis: an introduction. Dr. Dobb's Journal, September 2000.]]Google ScholarGoogle Scholar
  16. Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji, and Thomas A. Longstaff. A sense of self for Unix processes. In Proceedings of 1996 IEEE Symposium on Computer Security and Privacy, 1996.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Tal Garfinkel and Mendel Rosenblum. A Virtual Machine Introspection Based Architecture for Intrusion Detection. In Proceedings of the 2003 Network and Distributed System Security Symposium (NDSS), February 2003.]]Google ScholarGoogle Scholar
  18. Ian Goldberg, David Wagner, Randi Thomas, and Eric A. Brewer. A Secure Environment for Untrusted Helper Applications. In Proceedings of the 1996 USENIX Technical Conference, July 1996.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Xie Huagang. Build a secure system with LIDS, 2000. http://www.lids.org/document/build_lids-0.2.html.]]Google ScholarGoogle Scholar
  20. Gene H. Kim and Eugene H. Spafford. The design and implementation of Tripwire: a file system integrity checker. In Proceedings of 1994 ACM Conference on Computer and Communications Security (CCS), November 1994.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Samuel T. King, George W. Dunlap, and Peter M. Chen. Operating System Support for Virtual Machines. In Proceedings of the 2003 USENIX Technical Conference, pages 71--84, June 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Vladimir Kiriansky, Derek Bruening, and Saman Amarasinghe. Secure Execution Via Program Shepherding. In Proceedings of the 2002 USENIX Security Symposium, August 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Leslie Lamport. Time, Clocks, and the Ordering of Events in a Distributed System. Communications of the ACM, 21(7):558--565, July 1978.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Butler W. Lampson. A Note on the Confinement Problem. Communications of the ACM, 16(10):613--615, October 1973.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. The Honeynet Project, editor. Know your enemy: revealing the security tools, tactics, and motives of the blackhat community. Addison Wesley, August 2001.]]Google ScholarGoogle Scholar
  26. Frank Tip. A survey of program slicing techniques. Journal of Programming Languages, 3(3), 1995.]]Google ScholarGoogle Scholar
  27. W. M. Tyson. DERBI: Diagnosis, Explanation and Recovery from Computer Break-ins. Technical Report DARPA Project F30602-96-C-0295 Final Report, SRI International, Artificial Intelligence Center, January 2001. http://www.dougmoran.com/dmoran/publications.html.]]Google ScholarGoogle Scholar
  28. Larry Wall, Tom Christiansen, and Jon Orwant. Programming Perl, 3rd edition. O'Reilly & Associates, July 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Ningning Zhu and Tzi-cker Chiueh. Design, Implementation, and Evaluation of Repairable File Service. In Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN), June 2003.]]Google ScholarGoogle Scholar

Index Terms

  1. Backtracking intrusions

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Conferences
                SOSP '03: Proceedings of the nineteenth ACM symposium on Operating systems principles
                October 2003
                338 pages
                ISBN:1581137575
                DOI:10.1145/945445
                • cover image ACM SIGOPS Operating Systems Review
                  ACM SIGOPS Operating Systems Review  Volume 37, Issue 5
                  SOSP '03
                  December 2003
                  329 pages
                  ISSN:0163-5980
                  DOI:10.1145/1165389
                  Issue’s Table of Contents

                Copyright © 2003 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 19 October 2003

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • Article

                Acceptance Rates

                SOSP '03 Paper Acceptance Rate22of128submissions,17%Overall Acceptance Rate131of716submissions,18%

                Upcoming Conference

                SOSP '24

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader