WO2007130354A2 - Methods and apparatus providing computer and network security for polymorphic attacks - Google Patents
Methods and apparatus providing computer and network security for polymorphic attacks Download PDFInfo
- Publication number
- WO2007130354A2 WO2007130354A2 PCT/US2007/010454 US2007010454W WO2007130354A2 WO 2007130354 A2 WO2007130354 A2 WO 2007130354A2 US 2007010454 W US2007010454 W US 2007010454W WO 2007130354 A2 WO2007130354 A2 WO 2007130354A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- attack
- computer system
- polymorphic
- signature
- interface
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/564—Static detection by virus signature recognition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
Definitions
- BACKGROUND Computer systems, networks and data centers are exposed to a constant and differing variety of attacks that expose vulnerabilities of such systems in order to compromise their security and/or operation.
- various forms of malicious software program attacks include viruses, worms, Trojan horses and the like that computer systems can obtain over a network such as the Internet.
- users of such computer systems are not even aware that such malicious programs have been obtained within the computer system.
- a malicious program that executes might disrupt operation of the computer to a point of inoperability and/or might spread itself to other computers within a network or data center by exploiting vulnerabilities of the computer's operating system or resident application programs.
- Other malicious programs might operate within a computer to secretly extract and transmit information within the computer to remote computer systems for various suspect purposes.
- spyware is a form of software that can execute in the background (e.g., unbeknownst to users) of a computer system and can perform undesirable processing operations such as tracking, recording and transmitting user input from the spyware-resident computer system to a remote computer system.
- Spyware can allow remote computes to silently obtain otherwise confidential information such as usernames and passwords required to access protected data, lists, contents of files or even remote web sites user account information.
- virus detection software operates to periodically download a set of virus definitions from a remotely located server.
- the security software can monitor incoming data received by the computer system, such as email messages containing attachments, to identify viruses defined within the virus definitions that might be present within the data accessed by the computer. Such data might be obtained over a network or might be unknowingly resident on a computer readable medium, such as a disk or CD-ROM that a user inserts into the computer.
- the virus detection software can quarantine the inbound data so that a user of the computer system will not execute code or access the data containing the detected virus that might result in compromising the computer's operation.
- virus attacks include virus attacks, worm attacks, trpjan horse attacks, denial-of-service attacks, a buffer overflow operations, execution of malformed application data, and execution of malicious mobile code.
- Virus attacks, worm attacks, and trojan horse attacks are variants of each other that generally involve the execution of a program, for which a user often is unaware of its existence, that performs some undesired processing operations to comprise a computer's proper operation.
- a denial-of-service attack operates to provide an intentional simultaneous barrage of packets (e.g., many connection attempts) emanating from many different computer systems to one or more target computer systems, such as a web site, in order to intentionally cause an overload in processing capabilities of the target computer resulting in disruption of service or a business function provided by the target computer.
- Denial of Service attacks may also seek to crash the targeted machine (rather than simply consume resources).
- Buffer overflow attacks occur when programs do not provide appropriate checks of data stored in internal data structures within the software that result in overwriting surrounding areas of memory. Attacks based on buffer overflows might allow an attacker to execute arbitrary code on the target system to invoke privileged access, destroy data, or perform other undesirable functions.
- Malformed application data attacks might result in an application containing a code section that, if executed, provides access to resources that would otherwise be private to the application. Such attacks can expose vulnerabilities due to an incorrect implementation of the application, for example by failing to provide appropriate data validity checks, or allowing data stream parsing errors, and the like.
- Many of the conventional malicious programs and mechanisms for attack of computer systems include the ability to redistribute themselves to other computer systems or devices within a computer network, such that several computers become infected and experience the malicious processing activities discussed above.
- Some conventional attempts to prevent redistribution of malicious programs include implementing malicious program detection mechanisms such as virus detection software within firewalls or gateways between different portions of networked computer systems in order to halt propagation of malicious programs to sub-networks.
- conventional security software programs require periodic updates, such conventional security software programs are only as good as the most recent updates of the malicious program definitions (e.g., virus definitions) that individual instances of the conventional protection software have been able to receive.
- malicious program definitions e.g., virus definitions
- conventional virus detection software will not recognize viruses created and transmitted to a computer system that have not yet been identified and/or defined within the most recent update of a set of virus definitions obtained from a remote server. Accordingly, the malicious program code or data not defined within the most recent virus definitions update may be successfully inserted and executed within computer systems in a network in order to perform some of the malicious processing discussed above, even though such systems are equipped with conventional security software (i.e., virus detection software).
- a polymorphic attack may not be completely different than a previous version of the same polymorphic attack, but may have portions of the attack that differ from the previous version of the same attack. There is however, a common portion between the two polymorphic attacks. The common portion is not necessarily contiguous.
- Embodiments disclosed herein significantly overcome such deficiencies and provide a system that includes a polymorphic attack handling process.
- the polymorphic attack handling process rapidly identifies malicious attacks and prevents the spread of such attacks to other computer systems.
- embodiments disclosed herein provide for a self- healing computer network system.
- Embodiments disclosed herein include one or more security agents that operate within individual host computer systems in a network.
- the security agents can interact with a management center to obtain a security policy that contains a set of rules that indicate types of operations that may be allowed or disallowed within computer system.
- Once a security agent has obtained the security policy the security agent operates a plurality of security interceptors that can watch over and monitor processing operations performed by various software and hardware components within the host computer system which that security agent protects.
- the security agent provides security to a computerized device by detecting processing outcomes produced via operation of a sequence of related processing operations within the computerized device.
- processing operations related to an inbound connection to a Web server can be monitored by various interceptors operating within different parts of the computer system's operating system and application layer code in order to detect the related sequence of processing operations that the inbound Web server connection attempt triggers.
- Each interceptor detects a specific event and transfers that event to an event correlation engine that records the processing outcomes and the sequence of related processing operations in a security history.
- the event correlation engine identifies a security violation when one of the detected processing operations in the security history produces a processing outcome that violates a security policy.
- the security agent is then able to subsequently detect attempted performance of a similar sequence of related processing operations that attempt to produce at least one processing outcome that violates the security policy. In response, the security agent denies operation of at least a portion of the sequence of related processing operations within the computerized device to avoid violation of the security policy.
- the security agents can also mark or otherwise identify sequences of processing operations that led up to the security violation as a disallowed sequence of processing operations and can disseminate this information to other security agents operating on other host computer systems in the network in real-time (e.g., upon detection) in order to spread the knowledge of the behavior or processing pattern that the malicious attack attempted to perform on the computer system the detected the attack, so that other computer systems will not be vulnerable to the attack.
- Embodiments disclosed herein significantly overcome such deficiencies and provide a system that includes a polymorphic attack handling process.
- the polymorphic attack handling process provides control points on a computer system, to detect an attack on the computer system.
- the polymorphic attack handling process detects, and identifies a polymorphic attack on the computer system.
- the polymorphic attack is capable of modifying itself each time the polymorphic attack runs, such that the polymorphic attack appears to be a "Day Zero" attack each time the polymorphic attack executes.
- the polymorphic attack handling process attempts to generate an effective signature of the attack and fails.
- the polymorphic attack handling process then filters access to the interface on which the polymorphic attack was detected.
- the polymorphic attack handling process disables the interface on which the polymorphic attack was detected for a specified period of time.
- Embodiments disclosed herein include a computer system executing a polymorphic attack handling process.
- the polymorphic attack handling process detects an attack on the computer system, and identifies the attack as a polymorphic attack.
- the polymorphic attack is capable of modifying itself for every instance of execution of the attack. The modification of the attack is utilized to defeat detection of the attack.
- the polymorphic attack handling process determines that generation of an effective signature of the attack has failed (the signature is utilized to prevent execution of the attack).
- the polymorphic attack handling process then adjusts access to an interface to prevent further damage caused to the computer system by the attack.
- the polymorphic attack handling process is monitoring a computer system.
- the polymorphic attack handling process detects an attack on the computer system, and determines the attack has caused a system failure.
- the polymorphic attack handling process attempts to identify the attack by comparing the exploit code, associated with the attack, against signatures generated from previous attacks.
- the polymorphic attack handling process recognizes that the current attack is slightly different than previous attacks, but does not match signatures of previous attacks.
- the polymorphic attack handling process identifies the current attack as a polymorphic attack, and attempts to generate a signature of the polymorphic attack.
- the polymorphic attack handling process fails to generate an effective signature, and adjusts an interface where the polymorphic attack was identified.
- the polymorphic attack handling process disables the interface for a specified period of time. In another embodiment, the polymorphic attack handling process filters access to the interface to prevent further attacks. It should be noted that when the polymorphic attack handling process 'fails' to generate an effective signature, this can mean the signature is successfully generated, but the signature is too short to be effective in stopping future instances of the same polymorphic attack. A 'failed' signature can also mean a signature that matches 'good' traffic instead of only matching malicious traffic. In one embodiment, the signature generation succeeds, but the 'successfully' generated signature is only marginally better than the generated signature that is deemed to have 'failed'.
- inventions disclosed herein include any type of computerized device, workstation, handheld or laptop computer, or the like configured with software and/or circuitry (e.g., a processor) to process any or all of the method operations disclosed herein.
- a computerized device such as a computer or a data communications device or any type of processor that is programmed or configured to operate as explained herein is considered an embodiment disclosed herein.
- Other embodiments that are disclosed herein include software programs to perform the steps and operations summarized above and disclosed in detail below.
- One such embodiment comprises a computer program product that has a computer-readable medium including computer program logic encoded thereon that, when performed in a computerized device having a coupling of a memory and a processor, programs the processor to perform the operations disclosed herein.
- Such arrangements are typically provided as software, code and/or other data (e.g., data structures) arranged or encoded on a computer readable medium such as an optical medium (e.g., CD-ROM), floppy or hard disk or other a medium such as firmware or microcode in one or more ROM or RAM or PROM chips or as an Application Specific Integrated Circuit (ASIC).
- a computer readable medium such as an optical medium (e.g., CD-ROM), floppy or hard disk or other a medium such as firmware or microcode in one or more ROM or RAM or PROM chips or as an Application Specific Integrated Circuit (ASIC).
- the software or firmware or other such configurations can be installed onto a computerized device to cause the computerized device to perform the techniques explained herein as embodiments disclosed herein.
- system disclosed herein may be embodied strictly as a software program, as software and hardware, or as hardware alone.
- the features, as explained herein, may be employed in data communications devices and other computerized devices and software systems for such devices such as those manufactured by Cisco Systems, Inc. of San Jose, California.
- Figure 1 illustrates an example configuration of a network environment that includes a security system configured as disclosed herein.
- Figure 2 illustrates example architecture of the computerized device configured with a security system in one example configuration.
- Figure 3 illustrates a flowchart of a procedure performed by the system of Figure 1 when the polymorphic attack handling process detects an attack on the computer system, according to one embodiment disclosed herein.
- Figure 4 illustrates a flowchart of a procedure performed by the system of Figure 1 when the polymorphic attack handling process detects an attack on the computer system, and determines what type of attack is occurring on the computer system, according to one embodiment disclosed herein.
- Figure 5 illustrates a flowchart of a procedure performed by the system of Figure 1 when the polymorphic attack handling process identifies the attack as polymorphic, capable of modifying itself for every instance of execution of the attack, the modification of the attack utilized to defeat detection of the attack, according to one embodiment disclosed herein.
- Figure 6 illustrates a flowchart of a procedure performed by the system of Figure 1 when the polymorphic attack handling process determines generation of an effective signature of the attack has failed, the signature utilized to prevent execution of the attack, according to one embodiment disclosed herein.
- Figure 7 illustrates a flowchart of a procedure performed by the system of Figure 1 when the polymorphic attack handling process adjusts access to an interface to prevent further damage caused to the computer system by the attack, according to one embodiment disclosed herein.
- Embodiments disclosed herein provide a system that includes a polymorphic attack handling process.
- the polymorphic attack handling process provides control points on a computer system, to detect an attack on the computer system.
- the polymorphic attack handling process detects, and identifies a polymorphic attack on the computer system.
- the polymorphic attack is capable of modifying itself each time the polymorphic attack runs, such that the polymorphic attack appears to be a "Day Zero" attack each time the polymorphic attack executes.
- the polymorphic attack handling process attempts to generate an effective signature of the attack. In one embodiment, the attempt to generate an effective signature fails.
- the polymorphic attack handling process when the polymorphic attack handling process 'fails' to generate an effective signature, this can mean the signature is successfully generated, but the signature is too short to be effective in stopping future instances of the same polymorphic attack.
- a 'failed' signature can also mean a signature that matches 'good' traffic instead of only matching malicious traffic. In one embodiment, the signature generation succeeds, but the 'successfully' generated signature is only marginally better than the generated signature that is deemed to have 'failed'.
- the polymorphic attack handling process then filters access to the interface on which the polymorphic attack was detected. In one embodiment, the polymorphic attack handling process disables the interface on which the polymorphic attack was detected for a specified period of time.
- a polymorphic attack may not be completely different than a previous version of the same polymorphic attack, but may have portions of the attack that differ from the previous version of the same attack. There is however, a common portion between the two polymorphic attacks. The common portion is not necessarily contiguous.
- Embodiments disclosed herein include a computer system executing a polymorphic attack handling process.
- the polymorphic attack handling process detects an attack on the computer system, and identifies the attack as a polymorphic attack.
- the polymorphic attack is capable of modifying itself for every instance of execution of the attack.
- the modification of the attack is utilized to defeat detection of the attack.
- the polymorphic attack handling process determines that generation of an effective signature of the attack has failed (the signature is utilized to prevent execution of the attack).
- the polymorphic attack handling process then adjusts access to an interface to prevent further damage caused to the computer system by the attack.
- FIG. 1 illustrates an example computer networking environment 100 suitable for use in explaining example embodiments disclosed herein.
- the computer networking environment 100 includes a computer network 105 such as a local area network (LAN) that interconnects a security management computer system 115, an edge router 107, and a plurality of host computer systems 110, each of which operates (e.g., executes, runs, interprets or otherwise performs) a agent 150 configured as disclosed herein.
- Each agent 150 is running an instance of the polymorphic attack handling process 155.
- the security management computer system 115 also operates a management center application 160 that operates as disclosed herein.
- the edge router 107 couples the network 105 to a wide area network (WAN) 108 such as the Internet that allows communication between the computer systems 110, 115 and other computers worldwide.
- WAN wide area network
- the management center computer 115 may be isolated form the WAN 108 by a firewall that is not shown in this example.
- the host computers 110 may be any type of computer system, workstation, server (e.g., web server), personal computer, laptop, mainframe, personal digital assistant device, general purpose or dedicated computing device or the like that operate any type of software, firmware or operating system. They may be physically or wirelessly coupled to the network 105 to support communications.
- the security agents 150 and management center application 160 operate to dynamically detect and prevent malicious attacks on the computers 110 without requiring the security agents 150 to continuously and periodically download signature or virus definition files.
- an administrator 103 installs the security agents 150 (including the polymorphic attack handling process 155) on the computer systems 110 that are to be protected and they are responsible for enforcing the appropriate security policy on those systems.
- the security agents 150 have the ability to learn what causes security violations such as malicious attacks by monitoring, analyzing and recording processing behavior and events of the computer system 110 that occur prior to the security violation taking place, in order to prevent such events from occurring in the future.
- the security system disclosed herein in able to monitor and record processing behavior that results in an undesired processing operation such as a process exception, system crash or the like and is able to analyze recorded processing operations that led up to undesired operation or problem to identify the root cause of the failure. Once identified, the security system is able to prevent that single operation or sequence of processing operations identified as the root cause of failure from executing again on that or other computer system in order to avoid further security violations and to prevent such attacks on other computers.
- a security agent as disclosed herein can thus learn of new types of malicious attacks without having seen processing that causes such attacks in the past, and can prevent that attack in the future.
- the ability to learn of processing associated with a new attack, identify its root cause, and prevent it from happening in the future can occur without external input (e.g., virus definition files) being received by a computer system equipped with the security agent.
- Security agent operation includes being preprogrammed with certain known security violations in a rule-based security policy and preventing them from happening even a first time.
- processing also involves recording and postprocessing security history event data that result in a security violation (i.e., that was not preprogrammed and thus unrecognizable a first time) to identify a root cause (e.g., one or more processing operations or events) of the security violation within the computer system in order to prevent it from happening a second time.
- This can involve performing a local comparison of several security histories collected by a agent 150 in a single computer system 110 to identify a common pattern of processing activity that results in an undesirable processing outcome (i.e., a security violation).
- the security agents 150 can also transmit event and security history information to the management center 115.
- the management center 115 acts as a central repository for all event log records generated by the security agents 150 and provides functions for monitoring and reporting.
- the management center 115 also correlates event records generated from security agents 150 operating on different computer systems 110 for purposes of detecting suspicious activity in the network.
- FIG. 2 illustrates an architecture of a host computer system 110 configured with a security agent in accordance with one example embodiment.
- the security agent components include a plurality of security interceptors 200-1 through 200-7 including, for example, a network traffic interceptor 200-1, the network application interceptor 200-2, a file interceptor 200-3, a registry interceptor 200-4, a system call interceptor 200-5, a buffer overflow interceptor 200-6 and a data interceptor 200-7.
- the agent 150 in this example configuration also includes an event correlation engine 210, a security agent user interface 213, and local event manager 214.
- the event correlation engine 210 stores a security policy 211 that contains rules that are used to instruct the agent 150 to protects the computer 110 on which it operates by interpreting and enforcing the rules to restrict the operations that may be performed by that computer 110.
- An administrator 103 uses the management center application 160 to create and distribute security policies to each computer system 110 to be protected.
- the network traffic interceptor 200-1 resides between a communications protocol component 226 (such as a TCP driver), and the network interface card 224 or other communications interface.
- the network traffic interceptor 200-1 looks at packets coming from the network before they get to the native operating system TCP stack and can detect malicious operations or instructions such as a remote computer scanning the computer system 110.
- Such attacks can include, for example, a ping of death attack, a TCP SYN flood attack, port scanning attacks and so froth.
- Other security interceptors 200 can include packet interceptors, connection interceptors, file sharing interceptors, data filter interceptors, registry interceptors, system call interceptors, and the like.
- the interceptors 200 can be installed and executed by using, for example, windows registry keys that create dependencies on standard Operating System (OS) dynamically linked libraries (dlls) so that the interceptor dlls 200 are loaded along with the appropriate windows dlls that they monitor.
- OS Operating System
- dlls dynamically linked libraries
- This example configuration also includes several components that operate within the computer system 110 that are not part of the security agent architecture itself.
- this example configuration includes one or more software applications 220 that execute within a user space 240 within the computer system 110.
- the computer system 110 further operates several components in kernel space 242 such as one or more device peripheral device drivers 222, a network interface driver 224, communications protocol components 226, and an operating system 228.
- the components 222 through 228 are illustrated as separate for purposes of description of operations disclosed herein, and that they may be combined together, such as an operating system that includes device drivers 222 and communication protocol components 226.
- the interceptors are illustrated as separate for purposes of description of operations disclosed herein, and that they may be combined together, such as an operating system that includes device drivers 222 and communication protocol components 226.
- Event data 212 can include things such as the identification of new connection requests made to the network interface driver 224, as detected by the network traffic interceptor 200-1.
- the application file interceptor 200-2 can identify a processing activity such as an application 220 accessing a particular file via an operating system call and report this as event data 212 to the event correlation engine 210.
- the event correlation engine 210 correlates the event data 212 against the security policy 211 in order to provide an indication to the interceptors 200 of whether or not the processing activity associated with the event data should be allowed.
- the event correlation engine 210 can also instruct the interceptors 200 to collect more or less event data 212 as needed.
- the behavior of the computer system 110 can be analyzed and the series of events that took place that lead up the undesirable processing operation can be "fingerprinted" and marked so that if they occur again, they can be prevented prior to their full execution.
- a commonality between the attacks can be identified and prevented in the future, even in situations where the attacking program morphs its identity or changes it content.
- Figure 3 is a flowchart of the steps performed by the polymorphic attack handling process when it detects an attack on the computer system, and adjusts access to an interface to prevent further damage (caused by the attack) to the computer system.
- the steps described below are unordered meaning that, when possible, the steps can be performed in any convenient or desirable order.
- the polymorphic attack handling process 155 detects an attack on the computer system.
- the polymorphic attack handling process 155 executing within the security agent 150, monitors the computer system to detect suspicious activity on the computer system.
- the security agent 150 monitors application and system behavior for malicious activity, and enforces security when policy violations occur.
- a common approach for malicious programs is to attack a host via the network, breaching well known services offered by the end system on the network. These exploits often attempt to replicate as worms, upload and execute malicious code, or simply perform a Denial of Service against the targeted application or host. The first time an attack is detected, the attack is referred to as a "Day Zero" attack.
- the polymorphic attack handling process 155 identifies the attack as polymorphic, capable of modifying itself such that at least a portion of the attack is different from at least one previous instance of the attack, the modification of the attack utilized to defeat detection of the attack.
- the polymorphic attack handling process 155 identifies the attack as a "fixed" exploit code that, for example, replicates a worm, or accesses a system resource on the computer system.
- the polymorphic attack handling process 155 identifies the attack is not, for example, a virus executing code on the computer system, but rather, causing a system or application failure, resulting in, for example, a Denial of Service attack.
- the polymorphic attack handling process 155 identifies the attack appears to be a "Day Zero" attack, but contains a payload that can be modified in an arbitrary fashion. Thus, the polymorphic attack handling process 155 identifies the attack as polymorphic. Each instance of the polymorphic attack is modified such that the polymorphic attack handling process 155 has difficulty generating a signature for the attack, and the polymorphic attack defeats the attempt to detect the polymorphic attack.
- the polymorphic attack handling process 155 adjusts access to an interface to prevent further damage caused to the computer system by the attack.
- the polymorphic attack handling process 155 detects an attack on the computer system, and determines the attack is polymorphic.
- the polymorphic attack handling process 155 fails to generate an effective signature for the polymorphic attack, but identifies an interface failing as a result of the polymorphic attack.
- the polymorphic attack handling process 155 then adjusts access to that interface to prevent further damage to the computer system, by the polymorphic attack.
- the polymorphic attack handling process 155 determines generation of an effective signature has failed, the signature utilized to prevent execution of the attack.
- the polymorphic attack handling process 155 detects an attack on the computer system, identifies a type of attack (for example, a 'fixed' exploit code, a polymorphic attack, etc), and attempts to generate an effective signature for the attack. As each attack occurs, the polymorphic attack handling process 155 generates a signature for the attack. Repeated attacks of the same malicious code enables the polymorphic attack handling process 155 to refine the signature, generating a better signature each time that particular malicious code attacks the computer system. The signature is used to prevent future attacks of the same malicious code.
- the polymorphic attack handling process 155 detects an attack on the computer system, determines the attack is polymorphic, and determines the attempt to generate a signature has failed due to the inability of the polymorphic attack handling process 155 to identify a common payload in the polymorphic attack.
- Figure 4 is a flowchart of the steps performed by the polymorphic attack handling process when it detects an attack on the computer system, and determines what type of attack is occurring on the computer system.
- the polymorphic attack handling process 155 detects an attack on the computer system.
- the polymorphic attack handling process 155 executing within the security agent 150, monitors the computer system to detect suspicious activity on the computer system.
- the security agent 150 monitors application and system behavior for malicious activity, and enforces security when policy violations occur.
- the polymorphic attack handling process 155 provides at least one control point in the computer system, the at least one control point used to filter data associated with an execution of the attack.
- binary code of a well known exported function is modified to redirect function calls into a security sub routine.
- the security sub routine performs a set of required security checks, and then executes the original function call code. This technique may be used to modify not only drivers, but also application or DLL entry points.
- the control points are used to monitor behavior, as well as control access.
- the types of resources or system events, which may be monitored or controlled, include: • File and Directory access
- Network traffic payload control e.g., filter web URL or RPC calls, etc.
- the polymorphic attack handling process 155 receives notification from the at least one control point that an attack has been identified on the interface.
- the security agent 150 makes use of centrally defined security policies to enforce both static and behavioral controls over these types of system resources. The policies are tasked to stop "Day Zero" exploits at some point of execution. However, it is desirable to stop the exploit at the earliest possible time, to limit or prevent damage from occurring to the computer system as a result of the attack.
- the polymorphic attack handling process 155 detects a policy violation, determines a root cause of the policy violation (i.e., the attack on the computer system), and attempts to prevent the exploit from occurring again.
- the polymorphic attack handling process 155 receives notification, from at least one of the control points, that an attack has been identified on one of the interfaces on which a control point has been established.
- the polymorphic attack handling process 155 determines that the attack causes a failure of at least one component of the computer system.
- the polymorphic attack handling process 155 identifies an attack on the computer system.
- the polymorphic attack handling process 155 identifies that the attack is not executing code, but rather, causing a system or application failure.
- the polymorphic attack handling process 155 determines the attack contains an exploit code executable on the computer system. In an example embodiment, the polymorphic attack handling process 155 identifies an attack on the computer system. The polymorphic attack handling process 155 identifies a fixed exploit code that can be used to identify future attacks of this same exploit code. In an example embodiment, the polymorphic attack handling process 155 attempts to generate an effective signature for this attack.
- the polymorphic attack handling process 155 uses a type of policy violation resulting from the attack to identify the attack as a denial of service attack.
- the polymorphic attack handling process 155 identifies an attack on the computer system.
- the polymo ⁇ hic attack handling process 155 identifies the attack as a polymorphic attack causing a system failure, such as a Denial of Service failure.
- the polymorphic attack handling process 155 determines the attack is a Denial of Service, based on a type of policy violation that occurs as a result of the attack.
- Figure 5 is a flowchart of the steps performed by the polymorphic attack handling process when it identifies the attack as polymo ⁇ hic, capable of modifying itself such that at least a portion of the attack is different from at least one previous instance of the attack, the modification of the attack utilized to defeat detection of the attack.
- the polymorphic attack handling process 155 identifies the attack as polymorphic, capable of modifying itself such that at least a portion of the attack is different from at least one previous instance of the attack, the modification of the attack utilized to defeat detection of the attack.
- the polymo ⁇ hic attack handling process 155 identifies the attack appears to be a "Day Zero" attack, but contains a pay load that can be modified in an arbitrary fashion.
- the polymo ⁇ hic attack handling process 155 identifies the attack as polymo ⁇ hic.
- Each instance of the polymo ⁇ hic attack is modified such that the polymo ⁇ hic attack handling process 155 has difficulty generating an effective signature for the attack, and the polymo ⁇ hic attack defeats the attempt to detect the polymo ⁇ hic attack (and generate an effective signature).
- the polymo ⁇ hic attack handling process 155 identifies the attack as a possible first time instance of the attack.
- policy violations are mapped back to the data containing the exploit code (executed by the attack).
- a signature is generated for this exploit and associated with the data interface that is processing this information (e.g., a URI, a specific RPC interface, a local RPC interface, a system function call, etc.), and potentially, the source of the data.
- the signature is used to prevent this exact exploit from being repeated.
- the first time an attack occurs it is referred to as a "Day Zero" attack.
- the polymo ⁇ hic attack handling process 155 identifies that the attack appears to be a possible first time instance of the attack.
- the polymo ⁇ hic attack handling process 155 distinguishes the attack from a first time instance of the attack.
- the polymo ⁇ hic attack handling process 155 determines an attack has occurred, and attempts to generate an effective signature for the attack.
- the polymorphic attack handling process 155 compares the generated signature against previously generated 'good' signatures, and distinguishes the attack from a first time instance of the attack. Thus, the polymorphic attack handling process 155 determines the attack is not a first time instance of this attack.
- the polymorphic attack handling process 155 determines the attack contains random data not associated with identifiable previously known attack data.
- the polymorphic attack handling process 155 determines an attack has occurred, and attempts to generate an effective signature for the attack.
- the polymorphic attack handling process 155 identifies that some of the exploit code in the attack is similar to previous attacks, but does not match the signature of the previous attacks. Thus, the polymorphic attack handling process 155 determines the attack contains random data not associated with identifiable previously known attack data.
- Figure 6 is a flowchart of the steps performed by the polymorphic attack handling process when it determines generation of an effective signature of the attack has failed.
- the signature is utilized to prevent execution of the attack.
- the polymorphic attack handling process 155 determines generation of an effective signature has failed, the signature utilized to prevent execution of the attack.
- the polymorphic attack handling process 155 detects an attack on the computer system, identifies a type of attack (for example, a 'fixed' exploit code, a polymorphic attack, etc), and attempts to generate an effective signature for the attack. As each attack occurs, the polymorphic attack handling process 155 generates a signature for the attack. Repeated attacks of the same malicious code enables the polymorphic attack handling process 155 to refine the signature, generating a better signature each time that particular malicious code attacks the computer system. The signature is used to prevent future attacks of the same malicious code.
- the signature is shared with other computer systems within the network such that the computers systems in the network can contribute to refining the generated signature to produce an optimal signature for a detected attack.
- the polymorphic attack handling process 155 attempts to identify a signature associated with the attack, the signature to be used to prevent future attacks on the computer system, and to associate the attack with previous attacks, in an effort to identify the signature associated with this attack.
- the polymorphic attack handling process 155 determines an attack has occurred, and attempts to generate an effective signature for the attack.
- the signature is refined by comparing the new signature with previously generated signatures to create a 'better' signature. Once generated, the signature is shared with other hosts on the network to allow the hosts to generate a better signature more efficiently.
- the signature is also used to prevent future attacks on the computer system but preventing the same attack (identified by the signature) from occurring again.
- the polymorphic attack handling process 155 determines the attempt to generate an effective signature has failed.
- the polymorphic attack handling process 155 may not be able to generate a "better" signature, or even a common signature, even after repeated attacks of a polymorphic attack.
- the polymorphic attack may be a Denial of Service.
- the sole purpose of the attack is to destabilize or crash an application or a host. There may not actually be any exploit code contained in the attack.
- the remainder of the attack data i.e., the protocol headers, etc
- the polymorphic attack handling process 155 may generate a signature for the polymorphic attack, but the signature may prevent good traffic from traveling through the network. Thus, the polymorphic attack handling process 155 fails to identify an effective signature associated with the attack.
- Figure 7 is a flowchart of the steps performed by the polymorphic attack handling process when it adjusts access to an interface to prevent further damage caused to the computer system by the attack.
- the polymorphic attack handling process 155 adjusts access to an interface to prevent further damage caused to the computer system by the attack.
- the polymorphic attack handling process 155 detects an attack on the computer system, and determines the attack is polymorphic.
- the polymorphic attack handling process 155 fails to generate an effective signature for the polymorphic attack, but identifies an interface failing as a result of the polymorphic attack.
- the polymorphic attack handling process 155 then adjusts access to that interface to prevent further damage to the computer system, by the polymorphic attack.
- the polymorphic attack handling process 155 disables an interface to prevent access to that interface by the attack.
- the polymorphic attack handling process 155 identifies an attack on an interface, and disables access to that interface to prevent further attacks on that interface.
- the polymorphic attack handling process 155 may selectively disable the interface, for example, by only disabling the interface for the IP address from which the attack was generated.
- the polymorphic attack handling process 155 may also disable the interface for all untrustworthy IP addresses or networks.
- the polymorphic attack handling process 155 disables the interface for a predetermined period of time.
- the polymorphic attack handling process 155 identifies an attack on an interface, and disables access to that interface to prevent further attacks on that interface.
- the polymorphic attack handling process 155 may disable the interface for a predetermined period of time during which the attack is occurring.
- the polymorphic attack handling process 155 filters access to the interface to prevent successful launching of subsequent attempts of the attack.
- the polymorphic attack handling process 155 identifies an attack on an interface, and filters access to that interface to prevent further attacks on that interface.
- the polymorphic attack handling process 155 may filter access to the interface by using the generated signature, even if the generated signature is not considered to be an effective signature, but a 'good enough' signature.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- Virology (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
A system detects an attack on the computer system. The system identifies the attack as polymorphic, capable of modifying itself for every instance of execution of the attack. The modification of the attack is utilized to defeat detection of the attack. In one embodiment, the system determines generation of an effective signature of the attack has failed. The signature is utilized to prevent execution of the attack. The system then adjusts access to an interface to prevent further damage caused to the computer system by the attack.
Description
METHODS AND APPARATUS PROVIDING COMPUTER AND NETWORK SECURITY FOR POLYMORPHIC ATTACKS
BACKGROUND Computer systems, networks and data centers are exposed to a constant and differing variety of attacks that expose vulnerabilities of such systems in order to compromise their security and/or operation. As an example, various forms of malicious software program attacks include viruses, worms, Trojan horses and the like that computer systems can obtain over a network such as the Internet. Quite often, users of such computer systems are not even aware that such malicious programs have been obtained within the computer system. Once resident within a computer, a malicious program that executes might disrupt operation of the computer to a point of inoperability and/or might spread itself to other computers within a network or data center by exploiting vulnerabilities of the computer's operating system or resident application programs. Other malicious programs might operate within a computer to secretly extract and transmit information within the computer to remote computer systems for various suspect purposes. As an example, spyware is a form of software that can execute in the background (e.g., unbeknownst to users) of a computer system and can perform undesirable processing operations such as tracking, recording and transmitting user input from the spyware-resident computer system to a remote computer system. Spyware can allow remote computes to silently obtain otherwise confidential information such as usernames and passwords required to access protected data, lists, contents of files or even remote web sites user account information.
Computer system developers, software developers and security experts have created many types of conventional preventive measures that operate within conventional computer systems in an attempt to prevent operation of malicious programs from stealing information or from compromising proper operation of the computer systems. As an example, conventional virus detection software operates to periodically download a set of virus definitions from a remotely located server. Once the virus detection software obtains the definitions, the security software can monitor incoming data received by the computer system, such as email messages containing attachments, to identify viruses defined within the virus definitions that might be present within the data accessed by the computer. Such data
might be obtained over a network or might be unknowingly resident on a computer readable medium, such as a disk or CD-ROM that a user inserts into the computer. Upon detection of inbound data containing a virus or other malicious program, the virus detection software can quarantine the inbound data so that a user of the computer system will not execute code or access the data containing the detected virus that might result in compromising the computer's operation.
Other examples of conventional malicious attacks, intrusions, or undesirable processing that can cause problems within computer systems or even entire computer networks include virus attacks, worm attacks, trpjan horse attacks, denial-of-service attacks, a buffer overflow operations, execution of malformed application data, and execution of malicious mobile code. Virus attacks, worm attacks, and trojan horse attacks are variants of each other that generally involve the execution of a program, for which a user often is unaware of its existence, that performs some undesired processing operations to comprise a computer's proper operation. A denial-of-service attack operates to provide an intentional simultaneous barrage of packets (e.g., many connection attempts) emanating from many different computer systems to one or more target computer systems, such as a web site, in order to intentionally cause an overload in processing capabilities of the target computer resulting in disruption of service or a business function provided by the target computer. Denial of Service attacks may also seek to crash the targeted machine (rather than simply consume resources). Buffer overflow attacks occur when programs do not provide appropriate checks of data stored in internal data structures within the software that result in overwriting surrounding areas of memory. Attacks based on buffer overflows might allow an attacker to execute arbitrary code on the target system to invoke privileged access, destroy data, or perform other undesirable functions. Malformed application data attacks might result in an application containing a code section that, if executed, provides access to resources that would otherwise be private to the application. Such attacks can expose vulnerabilities due to an incorrect implementation of the application, for example by failing to provide appropriate data validity checks, or allowing data stream parsing errors, and the like.
Many of the conventional malicious programs and mechanisms for attack of computer systems, such as viruses and worms, include the ability to redistribute themselves to other computer systems or devices within a computer network, such that several computers become
infected and experience the malicious processing activities discussed above. Some conventional attempts to prevent redistribution of malicious programs include implementing malicious program detection mechanisms such as virus detection software within firewalls or gateways between different portions of networked computer systems in order to halt propagation of malicious programs to sub-networks.
SUMMARY
Conventional technologies for providing computer security suffer from a variety of deficiencies. In particular, conventional technologies for providing computer security are limited in that conventional security software programs rely on the ability to periodically remotely receive information such as virus definitions that allow the conventional security software programs to identify and quarantine malicious programs. Many of the most common conventional forms of security software such as virus definitions programs rely upon obtaining the periodic virus definition updates from a centralized server accessed over the Internet that is maintained by the vendor of the security software. As a result, the most recent virus definition updates only reflects those viruses that have been recently detected, fingerprinted in inserted into the virus definition file by the vendor of that maintains and distributes the virus definition files.
Because conventional security software programs require periodic updates, such conventional security software programs are only as good as the most recent updates of the malicious program definitions (e.g., virus definitions) that individual instances of the conventional protection software have been able to receive. As an example, conventional virus detection software will not recognize viruses created and transmitted to a computer system that have not yet been identified and/or defined within the most recent update of a set of virus definitions obtained from a remote server. Accordingly, the malicious program code or data not defined within the most recent virus definitions update may be successfully inserted and executed within computer systems in a network in order to perform some of the malicious processing discussed above, even though such systems are equipped with conventional security software (i.e., virus detection software). As a result, conventional security software program implementations are often several steps behind the prevention and spread of new attacks that are constantly being created and
disseminated by malicious program developers. This problem is compounded by the fact that modern malicious programs are able to distribute themselves quickly to hundreds or thousands of computer systems on a network such as the Internet within a short amount of time, such as several hours, whereas most conventional security software only obtains updates on a less frequent basis, such as nightly. Additionally, modern malicious programs can modify themselves to appear to be a new attack (called a "Day Zero" attack because this is the first time the attack appears on the network) each time the malicious program runs. These malicious programs are known as polymorphic attacks for their ability to appear to be a "Day Zero" attack each time they execute. A polymorphic attack may not be completely different than a previous version of the same polymorphic attack, but may have portions of the attack that differ from the previous version of the same attack. There is however, a common portion between the two polymorphic attacks. The common portion is not necessarily contiguous.
Embodiments disclosed herein significantly overcome such deficiencies and provide a system that includes a polymorphic attack handling process. The polymorphic attack handling process rapidly identifies malicious attacks and prevents the spread of such attacks to other computer systems. In effect, embodiments disclosed herein provide for a self- healing computer network system. Embodiments disclosed herein include one or more security agents that operate within individual host computer systems in a network. The security agents can interact with a management center to obtain a security policy that contains a set of rules that indicate types of operations that may be allowed or disallowed within computer system. Once a security agent has obtained the security policy, the security agent operates a plurality of security interceptors that can watch over and monitor processing operations performed by various software and hardware components within the host computer system which that security agent protects. The security agent provides security to a computerized device by detecting processing outcomes produced via operation of a sequence of related processing operations within the computerized device. As an example, processing operations related to an inbound connection to a Web server can be monitored by various interceptors operating within different parts of the computer system's operating system and application layer code in order to detect the related sequence of processing operations that the inbound Web server connection attempt triggers. Each interceptor detects a specific event
and transfers that event to an event correlation engine that records the processing outcomes and the sequence of related processing operations in a security history. The event correlation engine identifies a security violation when one of the detected processing operations in the security history produces a processing outcome that violates a security policy. This may be before, during or after occurrence of an undesired processing outcome within computer system such as a system crash, system error, protection violation, process disruption or other such undesired action as defined within the security policy. The security agent is then able to subsequently detect attempted performance of a similar sequence of related processing operations that attempt to produce at least one processing outcome that violates the security policy. In response, the security agent denies operation of at least a portion of the sequence of related processing operations within the computerized device to avoid violation of the security policy. The security agents can also mark or otherwise identify sequences of processing operations that led up to the security violation as a disallowed sequence of processing operations and can disseminate this information to other security agents operating on other host computer systems in the network in real-time (e.g., upon detection) in order to spread the knowledge of the behavior or processing pattern that the malicious attack attempted to perform on the computer system the detected the attack, so that other computer systems will not be vulnerable to the attack.
Embodiments disclosed herein significantly overcome such deficiencies and provide a system that includes a polymorphic attack handling process. The polymorphic attack handling process provides control points on a computer system, to detect an attack on the computer system. The polymorphic attack handling process detects, and identifies a polymorphic attack on the computer system. The polymorphic attack is capable of modifying itself each time the polymorphic attack runs, such that the polymorphic attack appears to be a "Day Zero" attack each time the polymorphic attack executes. The polymorphic attack handling process attempts to generate an effective signature of the attack and fails. The polymorphic attack handling process then filters access to the interface on which the polymorphic attack was detected. In one embodiment, the polymorphic attack handling process disables the interface on which the polymorphic attack was detected for a specified period of time.
Embodiments disclosed herein include a computer system executing a polymorphic attack handling process. The polymorphic attack handling process detects an attack on the computer system, and identifies the attack as a polymorphic attack. The polymorphic attack is capable of modifying itself for every instance of execution of the attack. The modification of the attack is utilized to defeat detection of the attack. The polymorphic attack handling process determines that generation of an effective signature of the attack has failed (the signature is utilized to prevent execution of the attack). The polymorphic attack handling process then adjusts access to an interface to prevent further damage caused to the computer system by the attack. During an example operation of one embodiment, suppose the polymorphic attack handling process is monitoring a computer system. The polymorphic attack handling process detects an attack on the computer system, and determines the attack has caused a system failure. The polymorphic attack handling process attempts to identify the attack by comparing the exploit code, associated with the attack, against signatures generated from previous attacks. The polymorphic attack handling process recognizes that the current attack is slightly different than previous attacks, but does not match signatures of previous attacks. The polymorphic attack handling process identifies the current attack as a polymorphic attack, and attempts to generate a signature of the polymorphic attack. The polymorphic attack handling process fails to generate an effective signature, and adjusts an interface where the polymorphic attack was identified. In one embodiment, the polymorphic attack handling process disables the interface for a specified period of time. In another embodiment, the polymorphic attack handling process filters access to the interface to prevent further attacks. It should be noted that when the polymorphic attack handling process 'fails' to generate an effective signature, this can mean the signature is successfully generated, but the signature is too short to be effective in stopping future instances of the same polymorphic attack. A 'failed' signature can also mean a signature that matches 'good' traffic instead of only matching malicious traffic. In one embodiment, the signature generation succeeds, but the 'successfully' generated signature is only marginally better than the generated signature that is deemed to have 'failed'. Other embodiments disclosed herein include any type of computerized device, workstation, handheld or laptop computer, or the like configured with software and/or
circuitry (e.g., a processor) to process any or all of the method operations disclosed herein. In other words, a computerized device such as a computer or a data communications device or any type of processor that is programmed or configured to operate as explained herein is considered an embodiment disclosed herein. Other embodiments that are disclosed herein include software programs to perform the steps and operations summarized above and disclosed in detail below. One such embodiment comprises a computer program product that has a computer-readable medium including computer program logic encoded thereon that, when performed in a computerized device having a coupling of a memory and a processor, programs the processor to perform the operations disclosed herein. Such arrangements are typically provided as software, code and/or other data (e.g., data structures) arranged or encoded on a computer readable medium such as an optical medium (e.g., CD-ROM), floppy or hard disk or other a medium such as firmware or microcode in one or more ROM or RAM or PROM chips or as an Application Specific Integrated Circuit (ASIC). The software or firmware or other such configurations can be installed onto a computerized device to cause the computerized device to perform the techniques explained herein as embodiments disclosed herein.
It is to be understood that the system disclosed herein may be embodied strictly as a software program, as software and hardware, or as hardware alone. The features, as explained herein, may be employed in data communications devices and other computerized devices and software systems for such devices such as those manufactured by Cisco Systems, Inc. of San Jose, California.
BRIEF DESCRIPTION OF THE DRAWINGS
The foregoing and other objects, features and advantages disclosed herein will be apparent from the following description of particular embodiments disclosed herein, as illustrated in the accompanying drawings in which like reference characters refer to the same parts throughout the different views. The drawings are not necessarily to scale, emphasis instead being placed upon illustrating the principles disclosed herein.
Figure 1 illustrates an example configuration of a network environment that includes a security system configured as disclosed herein.
Figure 2 illustrates example architecture of the computerized device configured with a security system in one example configuration.
Figure 3 illustrates a flowchart of a procedure performed by the system of Figure 1 when the polymorphic attack handling process detects an attack on the computer system, according to one embodiment disclosed herein.
Figure 4 illustrates a flowchart of a procedure performed by the system of Figure 1 when the polymorphic attack handling process detects an attack on the computer system, and determines what type of attack is occurring on the computer system, according to one embodiment disclosed herein. Figure 5 illustrates a flowchart of a procedure performed by the system of Figure 1 when the polymorphic attack handling process identifies the attack as polymorphic, capable of modifying itself for every instance of execution of the attack, the modification of the attack utilized to defeat detection of the attack, according to one embodiment disclosed herein.
Figure 6 illustrates a flowchart of a procedure performed by the system of Figure 1 when the polymorphic attack handling process determines generation of an effective signature of the attack has failed, the signature utilized to prevent execution of the attack, according to one embodiment disclosed herein.
Figure 7 illustrates a flowchart of a procedure performed by the system of Figure 1 when the polymorphic attack handling process adjusts access to an interface to prevent further damage caused to the computer system by the attack, according to one embodiment disclosed herein.
DETAILED DESCRIPTION
Embodiments disclosed herein provide a system that includes a polymorphic attack handling process. The polymorphic attack handling process provides control points on a computer system, to detect an attack on the computer system. The polymorphic attack handling process detects, and identifies a polymorphic attack on the computer system. The polymorphic attack is capable of modifying itself each time the polymorphic attack runs, such that the polymorphic attack appears to be a "Day Zero" attack each time the polymorphic attack executes. The polymorphic attack handling process attempts to generate an effective signature of the attack. In one embodiment, the attempt to generate an effective signature
fails. It should be noted that when the polymorphic attack handling process 'fails' to generate an effective signature, this can mean the signature is successfully generated, but the signature is too short to be effective in stopping future instances of the same polymorphic attack. A 'failed' signature can also mean a signature that matches 'good' traffic instead of only matching malicious traffic. In one embodiment, the signature generation succeeds, but the 'successfully' generated signature is only marginally better than the generated signature that is deemed to have 'failed'. The polymorphic attack handling process then filters access to the interface on which the polymorphic attack was detected. In one embodiment, the polymorphic attack handling process disables the interface on which the polymorphic attack was detected for a specified period of time. A polymorphic attack may not be completely different than a previous version of the same polymorphic attack, but may have portions of the attack that differ from the previous version of the same attack. There is however, a common portion between the two polymorphic attacks. The common portion is not necessarily contiguous. Embodiments disclosed herein include a computer system executing a polymorphic attack handling process. The polymorphic attack handling process detects an attack on the computer system, and identifies the attack as a polymorphic attack. The polymorphic attack is capable of modifying itself for every instance of execution of the attack. The modification of the attack is utilized to defeat detection of the attack. The polymorphic attack handling process determines that generation of an effective signature of the attack has failed (the signature is utilized to prevent execution of the attack). The polymorphic attack handling process then adjusts access to an interface to prevent further damage caused to the computer system by the attack.
Figure 1 illustrates an example computer networking environment 100 suitable for use in explaining example embodiments disclosed herein. The computer networking environment 100 includes a computer network 105 such as a local area network (LAN) that interconnects a security management computer system 115, an edge router 107, and a plurality of host computer systems 110, each of which operates (e.g., executes, runs, interprets or otherwise performs) a agent 150 configured as disclosed herein. Each agent 150 is running an instance of the polymorphic attack handling process 155. The security management computer system 115 also operates a management center application 160 that
operates as disclosed herein. The edge router 107 couples the network 105 to a wide area network (WAN) 108 such as the Internet that allows communication between the computer systems 110, 115 and other computers worldwide. Note that the management center computer 115 may be isolated form the WAN 108 by a firewall that is not shown in this example.
The host computers 110 may be any type of computer system, workstation, server (e.g., web server), personal computer, laptop, mainframe, personal digital assistant device, general purpose or dedicated computing device or the like that operate any type of software, firmware or operating system. They may be physically or wirelessly coupled to the network 105 to support communications. The security agents 150 and management center application 160 operate to dynamically detect and prevent malicious attacks on the computers 110 without requiring the security agents 150 to continuously and periodically download signature or virus definition files. Generally, an administrator 103 installs the security agents 150 (including the polymorphic attack handling process 155) on the computer systems 110 that are to be protected and they are responsible for enforcing the appropriate security policy on those systems.
The security agents 150 (including the polymorphic attack handling process 155) have the ability to learn what causes security violations such as malicious attacks by monitoring, analyzing and recording processing behavior and events of the computer system 110 that occur prior to the security violation taking place, in order to prevent such events from occurring in the future. In other words, the security system disclosed herein in able to monitor and record processing behavior that results in an undesired processing operation such as a process exception, system crash or the like and is able to analyze recorded processing operations that led up to undesired operation or problem to identify the root cause of the failure. Once identified, the security system is able to prevent that single operation or sequence of processing operations identified as the root cause of failure from executing again on that or other computer system in order to avoid further security violations and to prevent such attacks on other computers. A security agent as disclosed herein can thus learn of new types of malicious attacks without having seen processing that causes such attacks in the past, and can prevent that attack in the future. The ability to learn of processing associated with a new attack, identify its root cause, and prevent it from happening in the future can occur
without external input (e.g., virus definition files) being received by a computer system equipped with the security agent.
Security agent operation as explained herein includes being preprogrammed with certain known security violations in a rule-based security policy and preventing them from happening even a first time. In addition, such processing also involves recording and postprocessing security history event data that result in a security violation (i.e., that was not preprogrammed and thus unrecognizable a first time) to identify a root cause (e.g., one or more processing operations or events) of the security violation within the computer system in order to prevent it from happening a second time. This can involve performing a local comparison of several security histories collected by a agent 150 in a single computer system 110 to identify a common pattern of processing activity that results in an undesirable processing outcome (i.e., a security violation). The security agents 150 can also transmit event and security history information to the management center 115.
The management center 115 acts as a central repository for all event log records generated by the security agents 150 and provides functions for monitoring and reporting.
The management center 115 also correlates event records generated from security agents 150 operating on different computer systems 110 for purposes of detecting suspicious activity in the network.
Figure 2 illustrates an architecture of a host computer system 110 configured with a security agent in accordance with one example embodiment. The security agent components include a plurality of security interceptors 200-1 through 200-7 including, for example, a network traffic interceptor 200-1, the network application interceptor 200-2, a file interceptor 200-3, a registry interceptor 200-4, a system call interceptor 200-5, a buffer overflow interceptor 200-6 and a data interceptor 200-7. The agent 150 in this example configuration also includes an event correlation engine 210, a security agent user interface 213, and local event manager 214. The event correlation engine 210 stores a security policy 211 that contains rules that are used to instruct the agent 150 to protects the computer 110 on which it operates by interpreting and enforcing the rules to restrict the operations that may be performed by that computer 110. An administrator 103 uses the management center application 160 to create and distribute security policies to each computer system 110 to be protected.
• In one configuration, the network traffic interceptor 200-1 resides between a communications protocol component 226 (such as a TCP driver), and the network interface card 224 or other communications interface. The network traffic interceptor 200-1 looks at packets coming from the network before they get to the native operating system TCP stack and can detect malicious operations or instructions such as a remote computer scanning the computer system 110. Such attacks can include, for example, a ping of death attack, a TCP SYN flood attack, port scanning attacks and so froth. Other security interceptors 200 can include packet interceptors, connection interceptors, file sharing interceptors, data filter interceptors, registry interceptors, system call interceptors, and the like. The interceptors 200 can be installed and executed by using, for example, windows registry keys that create dependencies on standard Operating System (OS) dynamically linked libraries (dlls) so that the interceptor dlls 200 are loaded along with the appropriate windows dlls that they monitor. The interceptors can thus serve as wrappers to monitor processing operations of all calls made to any specific computer components. This example configuration also includes several components that operate within the computer system 110 that are not part of the security agent architecture itself. In particular, this example configuration includes one or more software applications 220 that execute within a user space 240 within the computer system 110. The computer system 110 further operates several components in kernel space 242 such as one or more device peripheral device drivers 222, a network interface driver 224, communications protocol components 226, and an operating system 228. It is to be understood that the components 222 through 228 are illustrated as separate for purposes of description of operations disclosed herein, and that they may be combined together, such as an operating system that includes device drivers 222 and communication protocol components 226. Generally, according to operations of embodiments disclosed herein, the interceptors
200 monitor processing activities and collect and report event data 212 to the event correlation engine 210 for the respective standard processing components 220 through 228 within the user and kernel spaces 240 and 242. The event correlation engine 210 stores the event data within one or more security histories 216. Event data 212 can include things such as the identification of new connection requests made to the network interface driver 224, as detected by the network traffic interceptor 200-1. As another example, the application file
interceptor 200-2 can identify a processing activity such as an application 220 accessing a particular file via an operating system call and report this as event data 212 to the event correlation engine 210. There may be other interceptors 200 besides those illustrated in Figure 2 and thus the interceptors 201 through 206 are shown by way of example only. The event correlation engine 210 correlates the event data 212 against the security policy 211 in order to provide an indication to the interceptors 200 of whether or not the processing activity associated with the event data should be allowed. The event correlation engine 210 can also instruct the interceptors 200 to collect more or less event data 212 as needed. By being able to track operations, in the event of an undesirable processing operation, the behavior of the computer system 110 can be analyzed and the series of events that took place that lead up the undesirable processing operation can be "fingerprinted" and marked so that if they occur again, they can be prevented prior to their full execution. In addition, by recording traces from multiple failures and determining a commonality between them, if several computer systems suffer similar attacks, a commonality between the attacks can be identified and prevented in the future, even in situations where the attacking program morphs its identity or changes it content.
Further details of configurations explained herein will now be provided with respect to a flow chart of processing steps that show the high level operations disclosed herein. Figure 3 is a flowchart of the steps performed by the polymorphic attack handling process when it detects an attack on the computer system, and adjusts access to an interface to prevent further damage (caused by the attack) to the computer system. Unless otherwise stated, the steps described below are unordered meaning that, when possible, the steps can be performed in any convenient or desirable order.
In step 200, the polymorphic attack handling process 155 detects an attack on the computer system. In an example embodiment, the polymorphic attack handling process 155, executing within the security agent 150, monitors the computer system to detect suspicious activity on the computer system. The security agent 150 monitors application and system behavior for malicious activity, and enforces security when policy violations occur. A common approach for malicious programs is to attack a host via the network, breaching well known services offered by the end system on the network. These exploits often attempt to replicate as worms, upload and execute malicious code, or simply perform a Denial of
Service against the targeted application or host. The first time an attack is detected, the attack is referred to as a "Day Zero" attack.
In step 201, the polymorphic attack handling process 155 identifies the attack as polymorphic, capable of modifying itself such that at least a portion of the attack is different from at least one previous instance of the attack, the modification of the attack utilized to defeat detection of the attack. In an example embodiment, the polymorphic attack handling process 155 identifies the attack as a "fixed" exploit code that, for example, replicates a worm, or accesses a system resource on the computer system. In another example embodiment, the polymorphic attack handling process 155 identifies the attack is not, for example, a virus executing code on the computer system, but rather, causing a system or application failure, resulting in, for example, a Denial of Service attack. In yet another example embodiment, the polymorphic attack handling process 155 identifies the attack appears to be a "Day Zero" attack, but contains a payload that can be modified in an arbitrary fashion. Thus, the polymorphic attack handling process 155 identifies the attack as polymorphic. Each instance of the polymorphic attack is modified such that the polymorphic attack handling process 155 has difficulty generating a signature for the attack, and the polymorphic attack defeats the attempt to detect the polymorphic attack.
In step 202, the polymorphic attack handling process 155 adjusts access to an interface to prevent further damage caused to the computer system by the attack. In an example configuration, the polymorphic attack handling process 155 detects an attack on the computer system, and determines the attack is polymorphic. The polymorphic attack handling process 155 fails to generate an effective signature for the polymorphic attack, but identifies an interface failing as a result of the polymorphic attack. The polymorphic attack handling process 155 then adjusts access to that interface to prevent further damage to the computer system, by the polymorphic attack.
In step 203, the polymorphic attack handling process 155 determines generation of an effective signature has failed, the signature utilized to prevent execution of the attack. In an example embodiment, the polymorphic attack handling process 155 detects an attack on the computer system, identifies a type of attack (for example, a 'fixed' exploit code, a polymorphic attack, etc), and attempts to generate an effective signature for the attack. As each attack occurs, the polymorphic attack handling process 155 generates a signature for the
attack. Repeated attacks of the same malicious code enables the polymorphic attack handling process 155 to refine the signature, generating a better signature each time that particular malicious code attacks the computer system. The signature is used to prevent future attacks of the same malicious code. In another example embodiment, the polymorphic attack handling process 155 detects an attack on the computer system, determines the attack is polymorphic, and determines the attempt to generate a signature has failed due to the inability of the polymorphic attack handling process 155 to identify a common payload in the polymorphic attack.
Figure 4 is a flowchart of the steps performed by the polymorphic attack handling process when it detects an attack on the computer system, and determines what type of attack is occurring on the computer system.
In step 204, the polymorphic attack handling process 155 detects an attack on the computer system. In an example embodiment, the polymorphic attack handling process 155, executing within the security agent 150, monitors the computer system to detect suspicious activity on the computer system. The security agent 150 monitors application and system behavior for malicious activity, and enforces security when policy violations occur.
In step 205, the polymorphic attack handling process 155 provides at least one control point in the computer system, the at least one control point used to filter data associated with an execution of the attack. In an example embodiment, binary code of a well known exported function is modified to redirect function calls into a security sub routine. The security sub routine performs a set of required security checks, and then executes the original function call code. This technique may be used to modify not only drivers, but also application or DLL entry points. The control points are used to monitor behavior, as well as control access. The types of resources or system events, which may be monitored or controlled, include: • File and Directory access
• Network access (both at the session level as well as the packet level)
• Network traffic payload control (e.g., filter web URL or RPC calls, etc)
• Registry access
• COM object access control • Accessing system calls
• Invoking applications
• Handling exceptions
• Detecting Buffer Overflows
• CPU utilization
• Memory utilization. In step 206, the polymorphic attack handling process 155 receives notification from the at least one control point that an attack has been identified on the interface. In an example embodiment, the security agent 150 makes use of centrally defined security policies to enforce both static and behavioral controls over these types of system resources. The policies are tasked to stop "Day Zero" exploits at some point of execution. However, it is desirable to stop the exploit at the earliest possible time, to limit or prevent damage from occurring to the computer system as a result of the attack. The polymorphic attack handling process 155 detects a policy violation, determines a root cause of the policy violation (i.e., the attack on the computer system), and attempts to prevent the exploit from occurring again. Thus, the polymorphic attack handling process 155 receives notification, from at least one of the control points, that an attack has been identified on one of the interfaces on which a control point has been established.
Alternatively, in step 207, the polymorphic attack handling process 155 determines that the attack causes a failure of at least one component of the computer system. In an example embodiment, the polymorphic attack handling process 155 identifies an attack on the computer system. The polymorphic attack handling process 155 identifies that the attack is not executing code, but rather, causing a system or application failure.
Alternatively, in step 208, the polymorphic attack handling process 155 determines the attack contains an exploit code executable on the computer system. In an example embodiment, the polymorphic attack handling process 155 identifies an attack on the computer system. The polymorphic attack handling process 155 identifies a fixed exploit code that can be used to identify future attacks of this same exploit code. In an example embodiment, the polymorphic attack handling process 155 attempts to generate an effective signature for this attack.
Alternatively, in step 209, the polymorphic attack handling process 155 uses a type of policy violation resulting from the attack to identify the attack as a denial of service attack. In an example embodiment, the polymorphic attack handling process 155 identifies an attack
on the computer system. The polymoφhic attack handling process 155 identifies the attack as a polymorphic attack causing a system failure, such as a Denial of Service failure. The polymorphic attack handling process 155 determines the attack is a Denial of Service, based on a type of policy violation that occurs as a result of the attack. Figure 5 is a flowchart of the steps performed by the polymorphic attack handling process when it identifies the attack as polymoφhic, capable of modifying itself such that at least a portion of the attack is different from at least one previous instance of the attack, the modification of the attack utilized to defeat detection of the attack.
In step 210, the polymorphic attack handling process 155 identifies the attack as polymorphic, capable of modifying itself such that at least a portion of the attack is different from at least one previous instance of the attack, the modification of the attack utilized to defeat detection of the attack. In an example embodiment, the polymoφhic attack handling process 155 identifies the attack appears to be a "Day Zero" attack, but contains a pay load that can be modified in an arbitrary fashion. Thus, the polymoφhic attack handling process 155 identifies the attack as polymoφhic. Each instance of the polymoφhic attack is modified such that the polymoφhic attack handling process 155 has difficulty generating an effective signature for the attack, and the polymoφhic attack defeats the attempt to detect the polymoφhic attack (and generate an effective signature).
In step 211, the polymoφhic attack handling process 155 identifies the attack as a possible first time instance of the attack. In an example embodiment, when an attack occurs, policy violations are mapped back to the data containing the exploit code (executed by the attack). Once the exploit data has been identified, a signature is generated for this exploit and associated with the data interface that is processing this information (e.g., a URI, a specific RPC interface, a local RPC interface, a system function call, etc.), and potentially, the source of the data. The signature is used to prevent this exact exploit from being repeated. The first time an attack occurs, it is referred to as a "Day Zero" attack. Thus, the polymoφhic attack handling process 155 identifies that the attack appears to be a possible first time instance of the attack.
In step 212, the polymoφhic attack handling process 155 distinguishes the attack from a first time instance of the attack. In an example embodiment, the polymoφhic attack handling process 155 determines an attack has occurred, and attempts to generate an effective
signature for the attack. The polymorphic attack handling process 155 compares the generated signature against previously generated 'good' signatures, and distinguishes the attack from a first time instance of the attack. Thus, the polymorphic attack handling process 155 determines the attack is not a first time instance of this attack. In step 213, the polymorphic attack handling process 155 determines the attack contains random data not associated with identifiable previously known attack data. In an example embodiment, the polymorphic attack handling process 155 determines an attack has occurred, and attempts to generate an effective signature for the attack. The polymorphic attack handling process 155 identifies that some of the exploit code in the attack is similar to previous attacks, but does not match the signature of the previous attacks. Thus, the polymorphic attack handling process 155 determines the attack contains random data not associated with identifiable previously known attack data.
Figure 6 is a flowchart of the steps performed by the polymorphic attack handling process when it determines generation of an effective signature of the attack has failed. The signature is utilized to prevent execution of the attack.
In step 214, the polymorphic attack handling process 155 determines generation of an effective signature has failed, the signature utilized to prevent execution of the attack. In an example embodiment, the polymorphic attack handling process 155 detects an attack on the computer system, identifies a type of attack (for example, a 'fixed' exploit code, a polymorphic attack, etc), and attempts to generate an effective signature for the attack. As each attack occurs, the polymorphic attack handling process 155 generates a signature for the attack. Repeated attacks of the same malicious code enables the polymorphic attack handling process 155 to refine the signature, generating a better signature each time that particular malicious code attacks the computer system. The signature is used to prevent future attacks of the same malicious code. The signature is shared with other computer systems within the network such that the computers systems in the network can contribute to refining the generated signature to produce an optimal signature for a detected attack.
In step 215, the polymorphic attack handling process 155 attempts to identify a signature associated with the attack, the signature to be used to prevent future attacks on the computer system, and to associate the attack with previous attacks, in an effort to identify the signature associated with this attack. In an example embodiment, the polymorphic attack
handling process 155 determines an attack has occurred, and attempts to generate an effective signature for the attack. The signature is refined by comparing the new signature with previously generated signatures to create a 'better' signature. Once generated, the signature is shared with other hosts on the network to allow the hosts to generate a better signature more efficiently. The signature is also used to prevent future attacks on the computer system but preventing the same attack (identified by the signature) from occurring again.
In step 216, the polymorphic attack handling process 155 determines the attempt to generate an effective signature has failed. In an example embodiment, the polymorphic attack handling process 155 may not be able to generate a "better" signature, or even a common signature, even after repeated attacks of a polymorphic attack. For example, the polymorphic attack may be a Denial of Service. In this example, the sole purpose of the attack is to destabilize or crash an application or a host. There may not actually be any exploit code contained in the attack. The remainder of the attack data (i.e., the protocol headers, etc) may be perfectly legitimate, and not distinguishable from good traffic. In another example embodiment, the polymorphic attack handling process 155 may generate a signature for the polymorphic attack, but the signature may prevent good traffic from traveling through the network. Thus, the polymorphic attack handling process 155 fails to identify an effective signature associated with the attack.
Figure 7 is a flowchart of the steps performed by the polymorphic attack handling process when it adjusts access to an interface to prevent further damage caused to the computer system by the attack.
In step 217, the polymorphic attack handling process 155 adjusts access to an interface to prevent further damage caused to the computer system by the attack. In an example configuration, the polymorphic attack handling process 155 detects an attack on the computer system, and determines the attack is polymorphic. The polymorphic attack handling process 155 fails to generate an effective signature for the polymorphic attack, but identifies an interface failing as a result of the polymorphic attack. The polymorphic attack handling process 155 then adjusts access to that interface to prevent further damage to the computer system, by the polymorphic attack. In step 218, the polymorphic attack handling process 155 disables an interface to prevent access to that interface by the attack. In an example configuration, the polymorphic
attack handling process 155 identifies an attack on an interface, and disables access to that interface to prevent further attacks on that interface. The polymorphic attack handling process 155 may selectively disable the interface, for example, by only disabling the interface for the IP address from which the attack was generated. The polymorphic attack handling process 155 may also disable the interface for all untrustworthy IP addresses or networks.
In step 219, the polymorphic attack handling process 155 disables the interface for a predetermined period of time. In an example embodiment, the polymorphic attack handling process 155 identifies an attack on an interface, and disables access to that interface to prevent further attacks on that interface. The polymorphic attack handling process 155 may disable the interface for a predetermined period of time during which the attack is occurring.
In step 220, the polymorphic attack handling process 155 filters access to the interface to prevent successful launching of subsequent attempts of the attack. In an example embodiment, the polymorphic attack handling process 155 identifies an attack on an interface, and filters access to that interface to prevent further attacks on that interface. The polymorphic attack handling process 155 may filter access to the interface by using the generated signature, even if the generated signature is not considered to be an effective signature, but a 'good enough' signature.
While the system and method have been particularly shown and described with references to configurations thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the scope of embodiments disclosed herein encompassed by the appended claims. Accordingly, the present embodiments disclosed herein are not intended to be limited by the example configurations provided above.
Claims
1. A method of providing computer security on a computer system, the method comprising: detecting an attack on the computer system; identifying the attack as polymorphic, capable of modifying itself such that at least a portion of the attack is different from at least one previous instance of the attack, the modification of the attack utilized to defeat detection of the attack; and adjusting access to an interface to prevent further damage caused to the computer system by the attack.
2. The method of Claim 1 comprising: determining generation of an effective signature has failed, the signature utilized to prevent execution of the attack.
3. The method of Claim 1 wherein detecting an attack on the computer system comprises: providing at least one control point in the computer system, the at least one control point used to filter data associated with an execution of the attack.
4. The method of Claim 3 comprising: receiving notification from the at least one control point that an attack has been identified on the interface.
5. The method of Claim 1 wherein detecting an attack on the computer system comprises: determining that the attack causes a failure of at least one component of the computer system.
6. The method of Claim 1 wherein detecting an attack on the computer system comprises: determining the attack contains an exploit code executable on the computer system.
7. The method of Claim 1 wherein detecting an attack on the computer system comprises: using a type of policy violation resulting from the attack to identify the attack as a denial of service attack
8. The method of Claim 1 wherein identifying the attack as polymorphic, capable of modifying itself such that at least a portion of the attack is different from at least one previous instance of the attack, the modification of the attack utilized to defeat detection of the attack comprises: identifying the attack as a possible first time instance of the attack; distinguishing the attack from a first time instance of the attack; and determining the attack contains random data not associated with identifiable previously known attack data.
9. The method of Claim 2 wherein determining generation of an effective signature has failed, the signature utilized to prevent execution of the attack comprises: attempting to identify a signature associated with the attack, the signature to be used: i) to prevent future attacks on the computer system; and ii) to associate a current attack with at least one previous attack in an effort to identify the signature associated with this attack; and determining the attempt to generate an effective signature has failed.
10. The method of Claim 1 wherein adjusting access to an interface to prevent further damage caused to the computer system by the attack comprises: disabling an interface to prevent access to that interface by the attack.
11. The method of Claim 10 wherein disabling an interface to prevent access to that interface by the attack comprises: disabling the interface for a predetermined period of time.
12. The method of Claim 1 wherein adjusting access to an interface to prevent further damage caused to the computer system by the attack comprises: filtering access to the interface to prevent successful launching of subsequent attempts of the attack.
13. A computer apparatus comprising: a memory; a processor; a communications interface; an interconnection mechanism coupling the memory, the processor and the communications interface; and wherein the memory is encoded with an application providing handling of a polymorphic attack that, when performed on the processor, provides a process for processing information, the process causing the computer apparatus to perform the operations of: providing an event correlation engine in communication with an application file interceptor; and wherein said event correlation engine detects an attack on the computer system, and wherein the attack is identified as a polymorphic attack by said event correlation engine, the polymorphic attack capable of modifying itself such that at least a portion of the attack is different from at least one previous instance of the attack, and wherein said event correlation engine adjusts access to an interface to prevent further damage caused to the computer system by the attack.
14. The apparatus of Claim 13 wherein the event correlation engine determines generation of an effective signature has failed, the signature utilized to prevent execution of the attack.
15. The apparatus of Claim 13 wherein when the event correlation engine detects an attack on the computer system, the event correlation engine provides at least one control point in the computer system, the at least one control point used to filter data associated with an execution of the attack.
16. The apparatus of Claim 13 wherein when the event correlation engine detects an attack on the computer system, the event correlation engine uses a type of policy violation resulting from the attack to identify the attack as a denial of service attack.
17. The apparatus of Claim 14 wherein when the event correlation engine determines generation of an effective signature of the attack has failed, the signature utilized to prevent execution of the attack, the event correlation engine attempts to identify a signature associated with the attack, the signature to be used to prevent future attacks on the computer system, and ii) to associate a current attack with at least one previous attack in an effort to identify the signature associated with this attack, and wherein the event correlation engine and wherein the event correlation engine determines the attempt to generate an effective signature has failed .
18. The apparatus of Claim 12 wherein when the event correlation engine adjusts access to an interface to prevent further damage caused to the computer system by the attack, the event correlation engine disables an interface to prevent access to that interface by the attack.
19. A computer readable medium encoded with computer programming logic that when executed on a process in a computerized device provides computer security, the medium comprising: instructions for detecting an attack on the computer system; instructions for identifying the attack as polymorphic, capable of modifying itself for every instance of execution of the attack, the modification of the attack utilized to defeat detection of the attack; instructions for determining generation of an effective signature of the attack has failed, the signature utilized to prevent execution of the attack; and instructions for adjusting access to an interface to prevent further damage caused to the computer system by the attack.
20. A computerized device comprising: a memory; a processor; a communications interface; an interconnection mechanism coupling the memory, the processor and the communications interface; wherein the memory is encoded with a polymorphic attack handling application that when executed on the processor configures the computerized device with a means for handling a polymorphic attack, the means including: means for detecting an attack on the computer system; means for identifying the attack as polymorphic, capable of modifying itself such that at least a portion of the attack is different from at least one previous instance of the attack, the modification of the attack utilized to defeat detection of the attack; and means for adjusting access to an interface to prevent further damage caused to the computer system by the attack.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP07756155A EP2013728B1 (en) | 2006-05-01 | 2007-04-30 | Methods and apparatus providing computer and network security for polymorphic attacks |
US13/591,092 US8771425B2 (en) | 2006-05-01 | 2012-08-21 | Process for the treatment of lignocellulosic biomass |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/414,910 | 2006-05-01 | ||
US11/414,910 US8413245B2 (en) | 2005-12-16 | 2006-05-01 | Methods and apparatus providing computer and network security for polymorphic attacks |
Related Child Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/226,763 A-371-Of-International US8394611B2 (en) | 2006-05-01 | 2007-04-30 | Process for the treatment of lignocellulosic biomass |
US13/591,092 Continuation US8771425B2 (en) | 2006-05-01 | 2012-08-21 | Process for the treatment of lignocellulosic biomass |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2007130354A2 true WO2007130354A2 (en) | 2007-11-15 |
WO2007130354A3 WO2007130354A3 (en) | 2008-10-02 |
Family
ID=38668230
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2007/010454 WO2007130354A2 (en) | 2006-05-01 | 2007-04-30 | Methods and apparatus providing computer and network security for polymorphic attacks |
Country Status (3)
Country | Link |
---|---|
US (1) | US8413245B2 (en) |
EP (1) | EP2013728B1 (en) |
WO (1) | WO2007130354A2 (en) |
Families Citing this family (56)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7447795B2 (en) * | 2001-04-11 | 2008-11-04 | Chelsio Communications, Inc. | Multi-purpose switching network interface controller |
US7724658B1 (en) | 2005-08-31 | 2010-05-25 | Chelsio Communications, Inc. | Protocol offload transmit traffic management |
US7660306B1 (en) | 2006-01-12 | 2010-02-09 | Chelsio Communications, Inc. | Virtualizing the operation of intelligent network interface circuitry |
US7660264B1 (en) | 2005-12-19 | 2010-02-09 | Chelsio Communications, Inc. | Method for traffic schedulign in intelligent network interface circuitry |
US7616563B1 (en) | 2005-08-31 | 2009-11-10 | Chelsio Communications, Inc. | Method to implement an L4-L7 switch using split connections and an offloading NIC |
US8495743B2 (en) | 2005-12-16 | 2013-07-23 | Cisco Technology, Inc. | Methods and apparatus providing automatic signature generation and enforcement |
US9286469B2 (en) * | 2005-12-16 | 2016-03-15 | Cisco Technology, Inc. | Methods and apparatus providing computer and network security utilizing probabilistic signature generation |
KR101303643B1 (en) * | 2007-01-31 | 2013-09-11 | 삼성전자주식회사 | Apparatus for detecting intrusion code and method using the same |
US8959647B2 (en) * | 2007-02-27 | 2015-02-17 | Microsoft Corporation | Runtime security and exception handler protection |
US8935406B1 (en) * | 2007-04-16 | 2015-01-13 | Chelsio Communications, Inc. | Network adaptor configured for connection establishment offload |
US8589587B1 (en) | 2007-05-11 | 2013-11-19 | Chelsio Communications, Inc. | Protocol offload in intelligent network adaptor, including application level signalling |
US8060644B1 (en) | 2007-05-11 | 2011-11-15 | Chelsio Communications, Inc. | Intelligent network adaptor with end-to-end flow control |
KR101003097B1 (en) * | 2007-12-18 | 2010-12-21 | 한국전자통신연구원 | Polymorphic Shell Code Detecting Method |
US8391834B2 (en) | 2009-01-28 | 2013-03-05 | Headwater Partners I Llc | Security techniques for device assisted services |
US8346225B2 (en) | 2009-01-28 | 2013-01-01 | Headwater Partners I, Llc | Quality of service for device assisted services |
US8275830B2 (en) | 2009-01-28 | 2012-09-25 | Headwater Partners I Llc | Device assisted CDR creation, aggregation, mediation and billing |
US8589541B2 (en) | 2009-01-28 | 2013-11-19 | Headwater Partners I Llc | Device-assisted services for protecting network capacity |
US8548428B2 (en) | 2009-01-28 | 2013-10-01 | Headwater Partners I Llc | Device group partitions and settlement platform |
US8832777B2 (en) | 2009-03-02 | 2014-09-09 | Headwater Partners I Llc | Adapting network policies based on device service processor configuration |
US8583781B2 (en) | 2009-01-28 | 2013-11-12 | Headwater Partners I Llc | Simplified service network architecture |
US8402111B2 (en) | 2009-01-28 | 2013-03-19 | Headwater Partners I, Llc | Device assisted services install |
US8406748B2 (en) | 2009-01-28 | 2013-03-26 | Headwater Partners I Llc | Adaptive ambient services |
US8365283B1 (en) * | 2008-08-25 | 2013-01-29 | Symantec Corporation | Detecting mutating malware using fingerprints |
US9781148B2 (en) * | 2008-10-21 | 2017-10-03 | Lookout, Inc. | Methods and systems for sharing risk responses between collections of mobile communications devices |
US20100107257A1 (en) | 2008-10-29 | 2010-04-29 | International Business Machines Corporation | System, method and program product for detecting presence of malicious software running on a computer system |
US8800040B1 (en) * | 2008-12-31 | 2014-08-05 | Symantec Corporation | Methods and systems for prioritizing the monitoring of malicious uniform resource locators for new malware variants |
US9706061B2 (en) | 2009-01-28 | 2017-07-11 | Headwater Partners I Llc | Service design center for device assisted services |
US10715342B2 (en) | 2009-01-28 | 2020-07-14 | Headwater Research Llc | Managing service user discovery and service launch object placement on a device |
US10264138B2 (en) | 2009-01-28 | 2019-04-16 | Headwater Research Llc | Mobile device and service management |
US10248996B2 (en) | 2009-01-28 | 2019-04-02 | Headwater Research Llc | Method for operating a wireless end-user device mobile payment agent |
US10841839B2 (en) | 2009-01-28 | 2020-11-17 | Headwater Research Llc | Security, fraud detection, and fraud mitigation in device-assisted services systems |
US10064055B2 (en) | 2009-01-28 | 2018-08-28 | Headwater Research Llc | Security, fraud detection, and fraud mitigation in device-assisted services systems |
US10492102B2 (en) | 2009-01-28 | 2019-11-26 | Headwater Research Llc | Intermediate networking devices |
US10200541B2 (en) * | 2009-01-28 | 2019-02-05 | Headwater Research Llc | Wireless end-user device with divided user space/kernel space traffic policy system |
US11218854B2 (en) | 2009-01-28 | 2022-01-04 | Headwater Research Llc | Service plan design, user interfaces, application programming interfaces, and device management |
US10237757B2 (en) | 2009-01-28 | 2019-03-19 | Headwater Research Llc | System and method for wireless network offloading |
US10798252B2 (en) | 2009-01-28 | 2020-10-06 | Headwater Research Llc | System and method for providing user notifications |
US9565707B2 (en) | 2009-01-28 | 2017-02-07 | Headwater Partners I Llc | Wireless end-user device with wireless data attribution to multiple personas |
US9955332B2 (en) | 2009-01-28 | 2018-04-24 | Headwater Research Llc | Method for child wireless device activation to subscriber account of a master wireless device |
US9954975B2 (en) | 2009-01-28 | 2018-04-24 | Headwater Research Llc | Enhanced curfew and protection associated with a device group |
US9270559B2 (en) | 2009-01-28 | 2016-02-23 | Headwater Partners I Llc | Service policy implementation for an end-user device having a control application or a proxy agent for routing an application traffic flow |
US11973804B2 (en) | 2009-01-28 | 2024-04-30 | Headwater Research Llc | Network service plan design |
US10779177B2 (en) | 2009-01-28 | 2020-09-15 | Headwater Research Llc | Device group partitions and settlement platform |
US9572019B2 (en) | 2009-01-28 | 2017-02-14 | Headwater Partners LLC | Service selection set published to device agent with on-device service selection |
US9980146B2 (en) | 2009-01-28 | 2018-05-22 | Headwater Research Llc | Communications device with secure data path processing agents |
US11985155B2 (en) | 2009-01-28 | 2024-05-14 | Headwater Research Llc | Communications device with secure data path processing agents |
US10326800B2 (en) | 2009-01-28 | 2019-06-18 | Headwater Research Llc | Wireless network service interfaces |
US10783581B2 (en) | 2009-01-28 | 2020-09-22 | Headwater Research Llc | Wireless end-user device providing ambient or sponsored services |
US9392462B2 (en) | 2009-01-28 | 2016-07-12 | Headwater Partners I Llc | Mobile end-user device with agent limiting wireless data communication for specified background applications based on a stored policy |
US10484858B2 (en) | 2009-01-28 | 2019-11-19 | Headwater Research Llc | Enhanced roaming services and converged carrier networks with device assisted services and a proxy |
US8370942B1 (en) * | 2009-03-12 | 2013-02-05 | Symantec Corporation | Proactively analyzing binary files from suspicious sources |
WO2014075704A1 (en) * | 2012-11-13 | 2014-05-22 | Siemens Aktiengesellschaft | Method and automation arrangement for controlling the data traffic between data processing devices |
WO2014159862A1 (en) | 2013-03-14 | 2014-10-02 | Headwater Partners I Llc | Automated credential porting for mobile devices |
US9660833B2 (en) * | 2014-05-09 | 2017-05-23 | Cisco Technology, Inc. | Application identification in records of network flows |
WO2016027292A1 (en) | 2014-08-22 | 2016-02-25 | 日本電気株式会社 | Analysis device, analysis method and computer-readable recording medium |
US11956270B2 (en) * | 2022-02-11 | 2024-04-09 | Oracle International Corporation | Parallel network-based vulnerability scanning |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060064755A1 (en) | 2004-09-21 | 2006-03-23 | Agere Systems Inc. | Methods and apparatus for interface adapter integrated virus protection |
Family Cites Families (64)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5696822A (en) * | 1995-09-28 | 1997-12-09 | Symantec Corporation | Polymorphic virus detection module |
US6088804A (en) * | 1998-01-12 | 2000-07-11 | Motorola, Inc. | Adaptive system and method for responding to computer network security attacks |
US6658571B1 (en) * | 1999-02-09 | 2003-12-02 | Secure Computing Corporation | Security framework for dynamically wrapping software applications executing in a computing system |
US6990591B1 (en) * | 1999-11-18 | 2006-01-24 | Secureworks, Inc. | Method and system for remotely configuring and monitoring a communication device |
US6775780B1 (en) * | 2000-03-16 | 2004-08-10 | Networks Associates Technology, Inc. | Detecting malicious software by analyzing patterns of system calls generated during emulation |
US7089428B2 (en) * | 2000-04-28 | 2006-08-08 | Internet Security Systems, Inc. | Method and system for managing computer security information |
US20040073617A1 (en) * | 2000-06-19 | 2004-04-15 | Milliken Walter Clark | Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail |
US20040064737A1 (en) * | 2000-06-19 | 2004-04-01 | Milliken Walter Clark | Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses |
CN1300677C (en) * | 2000-06-22 | 2007-02-14 | 微软公司 | Distributed computing services platform |
US7069583B2 (en) * | 2000-07-14 | 2006-06-27 | Computer Associates Think, Inc. | Detection of polymorphic virus code using dataflow analysis |
WO2002015264A2 (en) * | 2000-08-18 | 2002-02-21 | Siemens Aktiengesellschaft | Encapsulated organic-electronic component, method for producing the same and use thereof |
WO2002014989A2 (en) | 2000-08-18 | 2002-02-21 | Camelot Information Technologies Ltd. | Permission level generation based on adaptive learning |
WO2002019077A2 (en) * | 2000-09-01 | 2002-03-07 | Sri International, Inc. | Probabilistic alert correlation |
US20020032871A1 (en) * | 2000-09-08 | 2002-03-14 | The Regents Of The University Of Michigan | Method and system for detecting, tracking and blocking denial of service attacks over a computer network |
US6898715B1 (en) * | 2000-09-12 | 2005-05-24 | Networks Associates Technology, Inc. | Response to a computer virus outbreak |
US7315859B2 (en) * | 2000-12-15 | 2008-01-01 | Oracle International Corp. | Method and apparatus for management of encrypted data through role separation |
US20020166063A1 (en) * | 2001-03-01 | 2002-11-07 | Cyber Operations, Llc | System and method for anti-network terrorism |
US7290266B2 (en) | 2001-06-14 | 2007-10-30 | Cisco Technology, Inc. | Access control by a real-time stateful reference monitor with a state collection training mode and a lockdown mode for detecting predetermined patterns of events indicative of requests for operating system resources resulting in a decision to allow or block activity identified in a sequence of events based on a rule set defining a processing policy |
US7546629B2 (en) * | 2002-03-06 | 2009-06-09 | Check Point Software Technologies, Inc. | System and methodology for security policy arbitration |
US7237237B2 (en) * | 2001-07-24 | 2007-06-26 | The Mathworks, Inc. | Designating an object for destruction |
US7162741B2 (en) * | 2001-07-30 | 2007-01-09 | The Trustees Of Columbia University In The City Of New York | System and methods for intrusion detection with dynamic window sizes |
US6947726B2 (en) * | 2001-08-03 | 2005-09-20 | The Boeing Company | Network security architecture for a mobile network platform |
US7007302B1 (en) * | 2001-08-31 | 2006-02-28 | Mcafee, Inc. | Efficient management and blocking of malicious code and hacking attempts in a network environment |
US20030084319A1 (en) * | 2001-10-31 | 2003-05-01 | Tarquini Richard Paul | Node, method and computer readable medium for inserting an intrusion prevention system into a network stack |
AU2003202876A1 (en) | 2002-01-04 | 2003-07-24 | Internet Security Systems, Inc. | System and method for the managed security control of processes on a computer system |
US7448084B1 (en) * | 2002-01-25 | 2008-11-04 | The Trustees Of Columbia University In The City Of New York | System and methods for detecting intrusions in a computer system by monitoring operating system registry accesses |
US7227840B1 (en) * | 2002-03-18 | 2007-06-05 | Juniper Networks, Inc. | High performance probabilistic rate policer |
US20040015719A1 (en) * | 2002-07-16 | 2004-01-22 | Dae-Hyung Lee | Intelligent security engine and intelligent and integrated security system using the same |
CA2495147C (en) * | 2002-08-09 | 2013-02-12 | O. Patrick Kreidl | Control systems and methods using a partially-observable markov decision process (po-mdp) |
US7748039B2 (en) * | 2002-08-30 | 2010-06-29 | Symantec Corporation | Method and apparatus for detecting malicious code in an information handling system |
JP4400059B2 (en) * | 2002-10-17 | 2010-01-20 | 株式会社日立製作所 | Policy setting support tool |
US8909926B2 (en) * | 2002-10-21 | 2014-12-09 | Rockwell Automation Technologies, Inc. | System and methodology providing automation security analysis, validation, and learning in an industrial controller environment |
US7234166B2 (en) | 2002-11-07 | 2007-06-19 | Stonesoft Corporation | Event sequence detection |
US7401360B2 (en) * | 2002-12-03 | 2008-07-15 | Tekelec | Methods and systems for identifying and mitigating telecommunications network security threats |
US8990723B1 (en) * | 2002-12-13 | 2015-03-24 | Mcafee, Inc. | System, method, and computer program product for managing a plurality of applications via a single interface |
US7965717B2 (en) * | 2003-01-17 | 2011-06-21 | Nortel Networks Limited | Multi-staged services policing |
US7681235B2 (en) | 2003-05-19 | 2010-03-16 | Radware Ltd. | Dynamic network protection |
US7565426B2 (en) * | 2003-08-07 | 2009-07-21 | Alcatel Lucent | Mechanism for tracing back anonymous network flows in autonomous systems |
KR100558658B1 (en) * | 2003-10-02 | 2006-03-14 | 한국전자통신연구원 | In-line mode network intrusion detection/prevention system and method therefor |
US7237267B2 (en) * | 2003-10-16 | 2007-06-26 | Cisco Technology, Inc. | Policy-based network security management |
KR100561854B1 (en) * | 2003-12-16 | 2006-03-16 | 삼성전자주식회사 | Methods for storing haplotype data aligning the same therefor and retrieving the same thereby |
US8191139B2 (en) * | 2003-12-18 | 2012-05-29 | Honeywell International Inc. | Intrusion detection report correlator and analyzer |
EP1709556A4 (en) * | 2003-12-23 | 2011-08-10 | Trust Digital Llc | System and method for enforcing a security policy on mobile devices using dynamically generated security profiles |
US7334262B2 (en) * | 2004-01-22 | 2008-02-19 | Symantec Corporation | Proactive prevention of polymorphic SMTP worms |
US7716716B1 (en) * | 2004-06-24 | 2010-05-11 | Sprint Communications Company L.P. | Method and system for architecting enterprise data security |
EP1619572A1 (en) * | 2004-07-23 | 2006-01-25 | Texas Instruments Incorporated | System and method of identifying and preventing security violations within a computing system |
US20060026680A1 (en) * | 2004-07-29 | 2006-02-02 | Zakas Phillip H | System and method of characterizing and managing electronic traffic |
JP2006139747A (en) * | 2004-08-30 | 2006-06-01 | Kddi Corp | Communication system, and security assurance device |
US7752671B2 (en) * | 2004-10-04 | 2010-07-06 | Promisec Ltd. | Method and device for questioning a plurality of computerized devices |
EP1802058A1 (en) * | 2004-10-12 | 2007-06-27 | Nippon Telegraph and Telephone Corporation | Method for protection from service-disabling attack, system for protection from service-disabling attack, device for protection from service-disabling attack, relay device, program for protection from service-disabling attack, and relay device program |
US7549162B2 (en) * | 2004-12-06 | 2009-06-16 | At&T Intellectual Property I, L.P. | Methods of providing security for data distributions in a data network and related devices, networks, and computer program products |
US7739685B2 (en) * | 2005-01-06 | 2010-06-15 | International Business Machines Corporation | Decoupling a central processing unit from its tasks |
US7979889B2 (en) * | 2005-01-07 | 2011-07-12 | Cisco Technology, Inc. | Methods and apparatus providing security to computer systems and networks |
US8065712B1 (en) * | 2005-02-16 | 2011-11-22 | Cisco Technology, Inc. | Methods and devices for qualifying a client machine to access a network |
US8046834B2 (en) * | 2005-03-30 | 2011-10-25 | Alcatel Lucent | Method of polymorphic detection |
US20060236408A1 (en) * | 2005-04-14 | 2006-10-19 | International Business Machines Corporation | Method and apparatus for device dependent access control for device independent web content |
US20060259967A1 (en) * | 2005-05-13 | 2006-11-16 | Microsoft Corporation | Proactively protecting computers in a networking environment from malware |
US7516478B2 (en) * | 2005-06-03 | 2009-04-07 | Microsoft Corporation | Remote management of mobile devices |
US8549639B2 (en) * | 2005-08-16 | 2013-10-01 | At&T Intellectual Property I, L.P. | Method and apparatus for diagnosing and mitigating malicious events in a communication network |
US8001610B1 (en) * | 2005-09-28 | 2011-08-16 | Juniper Networks, Inc. | Network defense system utilizing endpoint health indicators and user identity |
WO2007047798A1 (en) * | 2005-10-21 | 2007-04-26 | Sensis Corporation | Method and apparatus for providing secure access control for protected information |
US7882560B2 (en) * | 2005-12-16 | 2011-02-01 | Cisco Technology, Inc. | Methods and apparatus providing computer and network security utilizing probabilistic policy reposturing |
US7872975B2 (en) * | 2007-03-26 | 2011-01-18 | Microsoft Corporation | File server pipelining with denial of service mitigation |
US8504504B2 (en) * | 2008-09-26 | 2013-08-06 | Oracle America, Inc. | System and method for distributed denial of service identification and prevention |
-
2006
- 2006-05-01 US US11/414,910 patent/US8413245B2/en active Active
-
2007
- 2007-04-30 WO PCT/US2007/010454 patent/WO2007130354A2/en active Application Filing
- 2007-04-30 EP EP07756155A patent/EP2013728B1/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060064755A1 (en) | 2004-09-21 | 2006-03-23 | Agere Systems Inc. | Methods and apparatus for interface adapter integrated virus protection |
Non-Patent Citations (1)
Title |
---|
See also references of EP2013728A4 |
Also Published As
Publication number | Publication date |
---|---|
WO2007130354A3 (en) | 2008-10-02 |
EP2013728A2 (en) | 2009-01-14 |
EP2013728A4 (en) | 2011-06-01 |
US20070143848A1 (en) | 2007-06-21 |
US8413245B2 (en) | 2013-04-02 |
EP2013728B1 (en) | 2013-01-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2013728B1 (en) | Methods and apparatus providing computer and network security for polymorphic attacks | |
US9148442B2 (en) | Methods and apparatus providing automatic signature generation and enforcement | |
US9286469B2 (en) | Methods and apparatus providing computer and network security utilizing probabilistic signature generation | |
US7882560B2 (en) | Methods and apparatus providing computer and network security utilizing probabilistic policy reposturing | |
US7607041B2 (en) | Methods and apparatus providing recovery from computer and network security attacks | |
US7979889B2 (en) | Methods and apparatus providing security to computer systems and networks | |
US7681226B2 (en) | Methods and apparatus providing security for multiple operational states of a computerized device | |
US9413742B2 (en) | Systems, methods and apparatus to apply permissions to applications | |
US7600259B2 (en) | Critical period protection | |
US7707620B2 (en) | Method to control and secure setuid/gid executables and processes | |
US7832008B1 (en) | Protection of computer resources | |
JP4914052B2 (en) | Method and system for distributing security policies | |
US7644271B1 (en) | Enforcement of security policies for kernel module loading | |
US20100071065A1 (en) | Infiltration of malware communications | |
US8572381B1 (en) | Challenge protected user queries | |
Tupakula et al. | Dynamic state-based security architecture for detecting security attacks in virtual machines | |
Tupakula et al. | Trust enhanced security architecture for detecting insider threats | |
Singh | Intrusion detection system (IDS) and intrusion prevention system (IPS) for network security: a critical analysis | |
Schultz et al. | Rootkits: Th e Ultimate Malware Th reat |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 07756155 Country of ref document: EP Kind code of ref document: A2 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2007756155 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |