学位论文详细信息
Robust and secure monitoring and attribution of malicious behaviors
Systems security;Virtualization;Malware detection;Security architecture
Srivastava, Abhinav ; Computer Science
University:Georgia Institute of Technology
Department:Computer Science
关键词: Systems security;    Virtualization;    Malware detection;    Security architecture;   
Others  :  https://smartech.gatech.edu/bitstream/1853/41161/1/srivastava_abhinav_201108_phd.pdf
美国|英语
来源: SMARTech Repository
PDF
【 摘 要 】

Worldwide computer systems continue to execute malicious software that degrades the systemsâ performance and consumes network capacity by generating high volumes of unwanted traffic. Network-based detectors can effectively identify machines participating in the ongoing attacks by monitoring the traffic to and from the systems. But, network detection alone is not enough; it does not improve the operation of the Internet or the health of other machines connected to the network. We must identify malicious code running on infected systems, participating in global attack networks.This dissertation describes a robust and secure approach that identifies malware present on infected systems based on its undesirable use of network. Our approach, using virtualization, attributes malicious traffic to host-level processes responsible for the traffic. The attribution identifies on-host processes, but malware instances often exhibit parasitic behaviors to subvert the execution of benign processes.We then augment the attribution software with a host-level monitor that detects parasitic behaviors occurring at the user- and kernel-level. User-level parasitic attack detection happens via the system-call interface because it is a non-bypassable interface for user-level processes. Due to the unavailability of one such interface inside the kernel for drivers, we create a new driver monitoring interface inside the kernel to detect parasitic attacks occurring through this interface.Our attribution software relies on a guest kernelâs data to identify on-host processes. To allow secure attribution, we prevent illegal modifications of critical kernel data from kernel-level malware. Together, our contributions produce a unified research outcome --an improved malicious code identification system for user- and kernel-level malware.

【 预 览 】
附件列表
Files Size Format View
Robust and secure monitoring and attribution of malicious behaviors 2569KB PDF download
  文献评价指标  
  下载次数:6次 浏览次数:12次