skip to main content
10.1145/1075405.1075425acmconferencesArticle/Chapter ViewAbstractPublication PagesfseConference Proceedingsconference-collections
Article

Self-healing mechanisms for kernel system compromises

Published:31 October 2004Publication History

ABSTRACT

Increasing demands for reliability and dependability clash with the reality of escalating security compromises and vulnerability discoveries. Improvements in attack methodologies such as polymorphic viruses, tampering of source code repositories, and automation of distributed strikes are no match for the untimely detection and manual recovery practices used today. We present a run-time method to automate recovery from kernel level system compromises. It is capable of returning modified system call table addresses back to their original values, terminating hidden processes, removing hidden files, and blocking attacker traffic to hidden connections. Self-healing mechanisms such as this can be employed to create more reliable intrusion tolerant operating systems and applications. A working prototype has been implemented as a loadable kernel module on Linux, and can be easily enhanced for other operating systems.

References

  1. Adore rootkit- http://www.t-teso.net/releases/adore-0.42.tgzGoogle ScholarGoogle Scholar
  2. Avizienis, A., et al, The STAR (self testing and repairing) computer, an investigation of the theory and practice of fault tolerant computer design. IEEE Transactions on Comput., 20(11) 1971, 1312--1321.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Chkrootkit. Signature based rootkit detection implementation. http://www.chkrootkit.org.Google ScholarGoogle Scholar
  4. {Esponda, F., Forrest, S., and Helman, P., A Formal Framework for Positive and Negative Detection Schemes. IEEE Transactions on System, Man, and Cybernetics, 34(1) 2004, 357--373. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Forrest, S., Hofmeyr, S., Somayaji, A., Longstaff, T., A Sense of Self for Unix Processes, In Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996, 120. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Garlan, D., Schmerl, B., Model-based Adaptation for Self-Healing Systems, In ACM SIGSOFT Workshop on Self-Managed Systems, 2002, 27--32. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Harrison, W., Heuston, G., Mocas, S., Morrissey, M., Richardson, J., High-tech forensics, Communications of the ACM, 47(7) 2004, 48--52. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Knight, J., Heimbigner, D., Wolf, A., Carzaniga, A., Hill, J., Devanbu, P., Gertz, M., The Willow Survivability Architecture, In Proceedings of the Fourth Information Survivability Workshop (ISW-2001), 2002, 18--20Google ScholarGoogle Scholar
  9. Lewandowski, S., Van Hook, D., O'Leary, G., Haines, J., Rossey, L., SARA: Survivable Autonomic Response Architecture. DARPA Information Survivability Conference and Exposition, 1, 2001, 77--88Google ScholarGoogle ScholarCross RefCross Ref
  10. Liu, P., ITDB: An Attack Self-Healing Database System Prototype, In Proceedings of the DARPA Information Survivability Conference and Exposition, 2 2003, 131--133.Google ScholarGoogle Scholar
  11. Ammann, P., Jajodia, S., Liu, Peng., Recovery from Malicious Transactions, In IEEE Transactions on Knowledge and Data Engineering, 14(5), 2002, 1167--1185. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Ring, S., Cole, E., Detecting and Dealing with New Rootkits. Sys Admin Magazine. September 2003.Google ScholarGoogle Scholar
  13. Ring, S., Cole, E., Taking a Lesson From Stealthy Rootkits, IEEE Security & Privacy, 1(4), 2004, 38--45 Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Ring, S., Cole, E., Volatile Memory Forensics to Detect Kernel Level Compromise, to appear in ICICS 2004. Lecture Notes in Computer Science. Springer-Verlag, Berlin, Germany.Google ScholarGoogle Scholar
  15. Somayaji, A., Hofmeyr, S., Forrest, S., Principles of a Computer Immune System, ACM New Security Paradigms Workshop, Charlottesville, VA, 1998, 75--82. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Tripwire. Change detection based rootkit identification implementation. http://www.tripwire.com.Google ScholarGoogle Scholar
  17. Understanding the Immune System. http://www.niaid.nih.gov/publications/immune/the_immune_system.pdf.Google ScholarGoogle Scholar
  18. Wu, T., A Passive Protected Self-Healing Mesh Network Architecture and Applications. IEEE/ACM Trans. on Networking, 2, 1 (Feb 1994), 49--52. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Self-healing mechanisms for kernel system compromises

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            WOSS '04: Proceedings of the 1st ACM SIGSOFT workshop on Self-managed systems
            October 2004
            119 pages
            ISBN:1581139896
            DOI:10.1145/1075405

            Copyright © 2004 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 31 October 2004

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article

            Upcoming Conference

            FSE '24

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader