Experiences Using Minos as a Tool for Capturing and Analyzing Novel Worms for Unknown Vulnerabilities
نویسندگان
چکیده
We present a honeypot technique based on an emulated environment of the Minos architecture [1] and describe our experiences and observations capturing and analyzing attacks. The main advantage of a Minos-enabled honeypot is that exploits based on corrupting control data can be stopped at the critical point where control flow is hijacked from the legitimate program, facilitating a detailed analysis of the exploit. Although Minos hardware has not yet been implemented, we are able to deploy Minos systems with the Bochs full system Pentium emulator. We discuss complexities of the exploits Minos has caught that are not accounted for in the simple model of “buffer overflow exploits” prevalent in the literature. We then propose the Epsilon-Gamma-Pi model to describe control data attacks in a way that is useful towards understanding polymorphic techniques. This model can not only aim at the centers of the concepts of exploit vector ( ), bogus control data (γ), and payload (π) but also give them shape. This paper will quantify the polymorphism available to an attacker for γ and π, while so characterizing is left for future work.
منابع مشابه
Prediction of Toxin-Antitoxin system (TA system) as a Novel Potent Target in Salmonella typhi Using Bioinformatics Analysis
Background and Objective: Salmonella typhi is one of the major challenges for the human and animal health. Salmonella with high pathogenicity can be harmful factor for human health. The control of this pathogen is a big challenge as it can cause serious infectious diseases such as gastroenteritis, septicemia and typhoid fever. On the other side, there are many factors such as toxin-antitoxin (T...
متن کاملUsing petrochemical wastewater for synthesis of cruxrhodopsin as an energy capturing nanoparticle by Haloarcula sp. IRU1
In this study, the feasibility of cruxrhodopsin (CR) production as a multifunctional nanoparticle was investigated and optimized by Halorculasp. IRU1, a novel halophile Archaea isolated from Urmia Lake, Iran in batch experiments. In this case, Taguchi method was used for effect measurement of three important factors (petrochemical wastewater, yeast extract and KH2PO4) on CR production. Results ...
متن کاملSecurity testing of session initiation protocol implementations
The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...
متن کاملNurses' Experiences of Using Hospital Information Systems: A Qualitative Study
Background & Aim: Nurses are the largest group of users of hospital information system and understanding their experiences in the use of this tool has a significant impact on the success or failure of it and ultimately, the quality of care for patients. The aim of this study was to explain the experiences of nurses for using hospital information system in educational hospitals of Tabriz in 2015...
متن کاملSting: An End-to-End Self-Healing System for Defending against Internet Worms
We increasingly rely on highly available systems in all areas of society, from the economy, to military, to the government. Unfortunately, much software, including critical applications, contains vulnerabilities unknown at the time of deployment, with memory-overwrite vulnerabilities (such as buffer overflow and format string vulnerabilities) accounting for more than 60% of total vulnerabilitie...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005