Scalable High-Assurance Technology for Detecting Compromised Host Computers

نویسندگان

  • J. McDermott
  • W. Snook
چکیده

J. McDermott, W. Snook, and J. Luo Information Technology Division Rootkits: Th e most common use of deceptive interpreters is in association with a rootkit. After attackers gain root or administrative access to the system, they can install malicious tools including backdoors, sniff ers, and tools to cover their tracks. Th ese tools will run with root privilege and have the ability to fully control the system. However, backdoors and sniff ers by themselves tend to have large signatures that could be easily detected. What makes rootkits exceptionally dangerous is the incorporation of deceptive interpreters that hide their presence. Deceptive interpretation can fool both automated tools and human system administrators into thinking their systems are safe. Th ey enable a rootkit and its malicious payload to operate for an extended period of time, thus drastically prolonging the system compromise and escalating the damage. Th e constant stream of new security vulnerabilities demonstrates that much of our technology is exploitable and at risk from deceptive interpretation. To inject deceptive interpretation into a military information system, it is only necessary to tamper with one link in the entire chain of computation (Fig. 1); preventing deceptive interpretation requires every link to be made tamper-proof. On the other hand, the eff ort for detecting deceptive interpretation is somewhere in the middle of those two extremes. Successful detection depends on monitoring the link that gets tampered with and recognizing that the tampering has occurred. Th e fundamental consequence of deceptive interpretation is that the host can no longer be trusted to inspect itself. A new technology is needed.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Network Meta-Reasoning for Information Assurance in Mobile Agent Systems

This paper develops a practical means of measuring information assurance for mobile agent systems operating on wireless, ad hoc networks based on meta-reasoning [Dix et ai, 2000; Xuan et al, 2001] to improve the security of communication. Figure 1 shows an agent system and its two distinct layers of communication: host-to-host and agent-toagent. Given the plethora of new techniques for identify...

متن کامل

High Information Assurance in Wireless Sensor Networks:

Tremendous advancements in embedded systems, sensors and wireless communications technology have made it possible to build wireless sensor networks (WSNs) consisting of a large number of sensor nodes capable of sensing, processing, and communicating wirelessly in a distributed manner. Indeed, WSNs are being deployed for real-time monitoring of various mission critical applications such as borde...

متن کامل

Computer vision technology for food quality assurance

Quality assurance is one of the most important goals of any industry. The ability to manufacture high-quality products consistently is the basis for success in the highly competitive food industry. It encourages loyalty in customers and results in an expanding market share. The quality assurance methods used in the food industry have traditionally involved human visual inspection. Such methods ...

متن کامل

COLLEGE OF COMPUTER , MATHEMATICAL AND PHYSICAL SCIENCES InterConnections

Phone: 301.405.6722 ally distributed development teams to assemble highly confi gurable systems from generic services and components and then incrementally adding new features to the system over time. Porter says he “wants to create the revolutionary new tools that will help companies succeed in this new environment”. He believes that this kind of software development only works if you have rap...

متن کامل

Metrics for Detecting Compromised Systems in Distributed Systems

Current electronic commerce systems are built using centralized client-server architecture; and their constituent processes are deployed to trusted computers. Therefore, attacks against these systems are characteristically data attacks; with the goal of accessing or compromising their confidential data. However with emergence of distributed applications, untrusted systems can now participate in...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010