Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3133956.3134045acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article
Public Access

RAIN: Refinable Attack Investigation with On-demand Inter-Process Information Flow Tracking

Published: 30 October 2017 Publication History
  • Get Citation Alerts
  • Abstract

    As modern attacks become more stealthy and persistent, detecting or preventing them at their early stages becomes virtually impossible. Instead, an attack investigation or provenance system aims to continuously monitor and log interesting system events with minimal overhead. Later, if the system observes any anomalous behavior, it analyzes the log to identify who initiated the attack and which resources were affected by the attack and then assess and recover from any damage incurred. However, because of a fundamental tradeoff between log granularity and system performance, existing systems typically record system-call events without detailed program-level activities (e.g., memory operation) required for accurately reconstructing attack causality or demand that every monitored program be instrumented to provide program-level information.
    To address this issue, we propose RAIN, a Refinable Attack INvestigation system based on a record-replay technology that records system-call events during runtime and performs instruction-level dynamic information flow tracking (DIFT) during on-demand process replay. Instead of replaying every process with DIFT, RAIN conducts system-call-level reachability analysis to filter out unrelated processes and to minimize the number of processes to be replayed, making inter-process DIFT feasible. Evaluation results show that RAIN effectively prunes out unrelated processes and determines attack causality with negligible false positive rates. In addition, the runtime overhead of RAIN is similar to existing system-call level provenance systems and its analysis overhead is much smaller than full-system DIFT.

    Supplemental Material

    MP4 File

    References

    [1]
    Mona Attariyan, Michael Chow, and Jason Flinn 2012. X-ray: automating root-cause diagnosis of performance anomalies in production software Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI). Hollywood, CA.
    [2]
    Adam Bates, Kevin Butler, Andreas Haeberlen, Micah Sherr, and Wenchao Zhou 2014. Let SDN be your eyes: Secure forensics in data center networks 2014 NDSS Workshop on Security of Emerging Network Technologies (SENT).
    [3]
    Adam Bates, Dave (Jing) Tian, Kevin R.B. Butler, and Thomas Moyer 2015. Trustworthy Whole-System Provenance for the Linux Kernel Proceedings of the 24th USENIX Security Symposium (Security). Washington, DC.
    [4]
    Kurt Baumgartner. 2017. On the StrongPity Waterhole Attacks Targeting Italian and Belgian Encryption Users. (Oct. 2017). shownotehttps://securelist.com/blog/research/76147.
    [5]
    Ang Chen, W. Brad Moore, Hanjun Xiao, Andreas Haeberlen, Linh Thi Xuan Phan, Micah Sherr, and Wenchao Zhou 2014. Detecting Covert Timing Channels with Time-Deterministic Replay Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI). Broomfield, Colorado.
    [6]
    Ang Chen, Yang Wu, Andreas Haeberlen, Boon Thau Loo, and Wenchao Zhou 2017. Data Provenance at Internet Scale: Architecture, Experiences, and the Road Ahead Conference on Innovative Data Systems Research (CIDR'17).
    [7]
    Ang Chen, Yang Wu, Andreas Haeberlen, Wenchao Zhou, and Boon Thau Loo 2016. The Good, the Bad, and the Differences: Better Network Diagnostics with Differential Provenance. In Proceedings of the 2016 ACM SIGCOMM. Florianopolis, Brazil.
    [8]
    Jim Chow, Tal Garfinkel, and Peter M. Chen 2008. Decoupling dynamic program analysis from execution in virtual environments Proceedings of the 2008 USENIX Annual Technical Conference (ATC). Boston, MA.
    [9]
    James Clause, Wanchun Li, and Alessandro Orso 2007. Dytan: a generic dynamic taint analysis framework. Proceedings of the International Symposium on Software Testing and Analysis (ISSTA). London, UK.
    [10]
    David Devecsery, Michael Chow, Xianzheng Dou, Jason Flinn, and Peter M Chen 2014. Eidetic systems Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI). Broomfield, Colorado.
    [11]
    Brendan Dolan-Gavitt, Josh Hodosh, Patrick Hulin, Tim Leek, and Ryan Whelan 2015. Repeatable Reverse Engineering with PANDA. In Proceedings of the 5th Program Protection and Reverse Engineering Workshop (PPREW).
    [12]
    George W. Dunlap, Samuel T. King, Sukru Cinar, Murtaza A. Basrai, and Peter M. Chen. 2002. ReVirt: Enabling Intrusion Analysis through Virtual-Machine Logging and Replay Proceedings of the 5th USENIX Symposium on Operating Systems Design and Implementation (OSDI). Boston, MA.
    [13]
    William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N. Sheth 2010. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI). Vancouver, Canada.
    [14]
    Earlence Fernandes, Justin Paupore, Amir Rahmati, Daniel Simionato, Mauro Conti, and Atul Prakash. 2016. FlowFence: Practical Data Protection for Emerging IoT Application Frameworks Proceedings of the 25th USENIX Security Symposium (Security). Austin, TX.
    [15]
    Ashish Gehani and Dawood Tariq 2012. SPADE: support for provenance auditing in distributed environments Proceedings of the 13th International Middleware Conference (Middleware).
    [16]
    Owen S. Hofmann, Alan M. Dunn, Sangman Kim, Indrajit Roy, and Emmett Witchel 2011. Ensuring Operating System Kernel Integrity with OSck Proceedings of the 16th ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS). Newport Beach, CA.
    [17]
    Yeongjin Jang, Simon P Chung, Bryan D Payne, and Wenke Lee. 2014. Gyrus: A Framework for User-Intent Monitoring of Text-based Networked Applications Proceedings of the 2014 Annual Network and Distributed System Security Symposium (NDSS). San Diego, CA.
    [18]
    Kangkook Jee, Vasileios P Kemerlis, Angelos D Keromytis, and Georgios Portokalidis 2013. ShadowReplica: efficient parallelization of dynamic data flow tracking Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS). Berlin, Germany.
    [19]
    Yang Ji, Sangho Lee, and Wenke Lee 2016. RecProv: Towards Provenance-Aware User Space Record and Replay Proceedings of the 5th International Provenance and Annotation Workshop (IPAW). Mclean, VA.
    [20]
    Vasileios P Kemerlis, Georgios Portokalidis, Kangkook Jee, and Angelos D Keromytis. 2012. libdft: Practical dynamic data flow tracking for commodity systems Proceedings of the 8th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments. London, UK.
    [21]
    Taesoo Kim, Ramesh Chandra, and Nickolai Zeldovich. 2012. Recovering from intrusions in distributed systems with DARE Proceedings of the 3rd Asia-Pacific Workshop on Systems (APSys). Seoul, South Korea.
    [22]
    Taesoo Kim, Xi Wang, Nickolai Zeldovich, and M Frans Kaashoek 2010. Intrusion Recovery Using Selective Re-execution. Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI). Vancouver, Canada.
    [23]
    Hojoon Lee, HyunGon Moon, DaeHee Jang, Kihwan Kim, Jihoon Lee, Yunheung Paek, and Brent ByungHoon Kang 2013. KI-Mon: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object Proceedings of the 22th USENIX Security Symposium (Security). Washington, DC.
    [24]
    Kyu Hyung Lee, Xiangyu Zhang, and Dongyan Xu. 2013. High Accuracy Attack Provenance via Binary-based Execution Partition Proceedings of the 20th Annual Network and Distributed System Security Symposium (NDSS). San Diego, CA.
    [25]
    Shiqing Ma, Xiangyu Zhang, and Dongyan Xu 2016. ProTracer: towards practical provenance tracing by alternating between logging and tainting Proceedings of the 2016 Annual Network and Distributed System Security Symposium (NDSS). San Diego, CA.
    [26]
    Emaad A Manzoor, Sadegh Momeni, and Leman Akoglu. 2016. Fast Memory-efficient Anomaly Detection in Streaming Heterogeneous Graphs Proceedings of the 22nd ACM SIGKDD Knowledge Discovery and Data Mining (KDD). San Francisco, CA.
    [27]
    Jiang Ming, Dinghao Wu, Jun Wang, Gaoyao Xiao, and Peng Liu 2016. StraightTaint: decoupled offline symbolic taint analysis Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering (ASE). Singapore.
    [28]
    Jiang Ming, Dinghao Wu, Gaoyao Xiao, Jun Wang, and Peng Liu 2015. TaintPipe: pipelined symbolic taint analysis. In Proceedings of the 24th USENIX Security Symposium (Security). Washington, DC.
    [29]
    Hyungon Moon, Hojoon Lee, Jihoon Lee, Kihwan Kim, Yunheung Paek, and Brent Byunghoon Kang 2012. Vigilare: Toward Snoop-based Kernel integrity Monitor Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS). Raleigh, NC.
    [30]
    Kiran-Kumar Muniswamy-Reddy, Uri Braun, David A Holland, Peter Macko, Diana L MacLean, Daniel W Margo, Margo I Seltzer, and Robin Smogor 2009. Layering in Provenance Systems. In Proceedings of the 2009 USENIX Annual Technical Conference (ATC). San Diego, CA.
    [31]
    Kiran-Kumar Muniswamy-Reddy, David A. Holland, Uri Braun, and Margo Seltzer 2006. Provenance-Aware Storage Systems. In Proceedings of the 2006 USENIX Annual Technical Conference (ATC). Boston, MA.
    [32]
    James Newsome and Dawn Song 2005. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Proceedings of the 12th Annual Network and Distributed System Security Symposium (NDSS). San Diego, CA.
    [33]
    Harish Patil, Cristiano Pereira, Mack Stallcup, Gregory Lueck, and James Cownie 2010. PinPlay: A Framework for Deterministic Replay and Reproducible Analysis of Parallel Programs Proceedings of the 8th Annual IEEE/ACM International Symposium on Code Generation and Optimization (CGO).
    [34]
    Nick L Petroni Jr, Timothy Fraser, Jesus Molina, and William A Arbaugh 2004. Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor Proceedings of the 13th USENIX Security Symposium (Security). San Diego, CA.
    [35]
    Andrew Quinn, Dave Devecsery, Peter M. Chen, and Jason Flinn 2016. JetStream: Cluster-scale parallelization of information flow queries Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI). Savannah, GA.
    [36]
    Shiru Ren, Le Tan, Chunqi Li, Zhen Xiao, and Weijia Song 2016. Samsara: Efficient Deterministic Replay in Multiprocessor Environments with Hardware Virtualization Extensions. In Proceedings of the 2016 USENIX Annual Technical Conference (ATC). Denver, CO.
    [37]
    Christos Sakalis, Carl Leonardsson, Stefanos Kaxiras, and Alberto Ros 2016. Splash-3: A properly synchronized benchmark suite for contemporary research IEEE International Symposium On Performance Analysis of Systems and Software (ISPASS'16).
    [38]
    Arvind Seshadri, Mark Luk, Ning Qu, and Adrian Perrig. 2007. SecVisor: A Tiny Hypervisor to Provide Lifetime Kernel Code Integirty for Commodity OSes Proceedings of the 21st ACM Symposium on Operating Systems Principles (SOSP). Stevenson, WA.
    [39]
    Sudarshan M Srinivasan, Srikanth Kandula, Christopher R Andrews, and Yuanyuan Zhou 2004. Flashback: A Lightweight Extension for Rollback and Deterministic Replay for Software Debugging Proceedings of the 2004 USENIX Annual Technical Conference (ATC). Boston, MA.
    [40]
    Manolis Stamatogiannakis, Paul Groth, and Herbert Bos. 2014. Looking inside the black-box: capturing data provenance using dynamic instrumentation Proceedings of the 5th International Provenance and Annotation Workshop (IPAW). Cologne, Germany.
    [41]
    Manolis Stamatogiannakis, Paul Groth, and Herbert Bos. 2015. Decoupling Provenace Capture and Analysis from Execution Proceedings of the 7th USENIX Workshop on the Theory and Practice on Provenance (TaPP). Edinburgh, Scotland.
    [42]
    G. Edward Suh, Jae W. Lee, and Srinivas Devadas. 2004. Secure Program Execution via Dynamic Information Flow Tracking Proceedings of the 11th ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS). Boston, MA.
    [43]
    Zhang Xu, Zhenyu Wu, Zhichun Li, Kangkook Jee, Junghwan Rhee, Xusheng Xiao, Fengyuan Xu, Haining Wang, and Guofei Jiang 2016. High Fidelity Data Reduction for Big Data Security Dependency Analyses Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS). Vienna, Austria.
    [44]
    Mengjia Yan, Yasser Shalabi, and Josep Torrellas. 2016. ReplayConfusion: Detecting Cache-based Covert Channel Attacks Using Record and Replay Proceedings of the 49th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO). Taipei, Taiwan.
    [45]
    Heng Yin, Dawn Song, Manuel Egele, Christopher Kruegel, and Engin Kirda 2007. Panorama: capturing system-wide information flow for malware detection and analysis Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS). Alexandria, VA.
    [46]
    Wenchao Zhou, Qiong Fei, Arjun Narayan, Andreas Haeberlen, Boon Thau Loo, and Micah Sherr. 2011. Secure network provenance. In Proceedings of the 23rd ACM Symposium on Operating Systems Principles (SOSP). Cascais, Portugal. endthebibliography

    Cited By

    View all
    • (2024)A benchmark suite and performance analysis of user-space provenance collectorsProceedings of the 2nd ACM Conference on Reproducibility and Replicability10.1145/3641525.3663627(85-95)Online publication date: 18-Jun-2024
    • (2024)Merlin: Multi-tier Optimization of eBPF Code for Performance and CompactnessProceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 310.1145/3620666.3651387(639-653)Online publication date: 27-Apr-2024
    • (2024)Stochastic Dynamic Information Flow Tracking game using supervised learning for detecting advanced persistent threatsAutomatica (Journal of IFAC)10.1016/j.automatica.2023.111353159:COnline publication date: 4-Mar-2024
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security
    October 2017
    2682 pages
    ISBN:9781450349468
    DOI:10.1145/3133956
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 30 October 2017

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. attack provenance
    2. forensic analysis
    3. information flow analysis
    4. record and replay

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    CCS '17
    Sponsor:

    Acceptance Rates

    CCS '17 Paper Acceptance Rate 151 of 836 submissions, 18%;
    Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

    Upcoming Conference

    CCS '24
    ACM SIGSAC Conference on Computer and Communications Security
    October 14 - 18, 2024
    Salt Lake City , UT , USA

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)379
    • Downloads (Last 6 weeks)38
    Reflects downloads up to 27 Jul 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)A benchmark suite and performance analysis of user-space provenance collectorsProceedings of the 2nd ACM Conference on Reproducibility and Replicability10.1145/3641525.3663627(85-95)Online publication date: 18-Jun-2024
    • (2024)Merlin: Multi-tier Optimization of eBPF Code for Performance and CompactnessProceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 310.1145/3620666.3651387(639-653)Online publication date: 27-Apr-2024
    • (2024)Stochastic Dynamic Information Flow Tracking game using supervised learning for detecting advanced persistent threatsAutomatica (Journal of IFAC)10.1016/j.automatica.2023.111353159:COnline publication date: 4-Mar-2024
    • (2023)Auditing frameworks need resource isolationProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620258(355-372)Online publication date: 9-Aug-2023
    • (2023)ViaLin: Path-Aware Dynamic Taint Analysis for AndroidProceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering10.1145/3611643.3616330(1598-1610)Online publication date: 30-Nov-2023
    • (2023)Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response ToolsProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3616580(2396-2410)Online publication date: 15-Nov-2023
    • (2023)SysFlow: Toward a Programmable Zero Trust Framework for System SecurityIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.326415218(2794-2809)Online publication date: 1-Jan-2023
    • (2023)SoK: History is a Vast Early Warning System: Auditing the Provenance of System Intrusions2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10179405(2620-2638)Online publication date: May-2023
    • (2022)A Survey of Host-Based Advanced Persistent Threat Detection TechnologyComputer Science and Application10.12677/CSA.2022.12102412:01(233-251)Online publication date: 2022
    • (2022)A flexible approach for cyber threat hunting based on kernel audit recordsCybersecurity10.1186/s42400-022-00111-25:1Online publication date: 1-Jun-2022
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media