skip to main content
10.1145/1533057.1533077acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

TimeVM: a framework for online intrusion mitigation and fast recovery using multi-time-lag traffic replay

Published:10 March 2009Publication History

ABSTRACT

Network intrusions become a signification threat to network servers and its availability. A simple intrusion can suspend the organization's network services and can lead to a financial disaster. In this paper, we propose a framework called TimeVM to mitigate, or even eliminate, the infection of a network intrusion on-line as fast as possible. The framework is based on the virtual machine technology and traffic-replay-based recovery. TimeVM gives the illusion of "time machine". TimeVM logs only the network traffic to a server and replays the logged traffic to multiple "shadow" virtual machines (Shadow VM) after different time delays (time lags). Consequently, each Shadow VM will represent the server at different time in history. When attack/infection is detected, TimeVM enables navigating through the traffic history (logs), picking uninfected Shadow VM, removing the attack traffic, and then fast-replaying the entire traffic history to this Shadow VM. As a result, a typical up-to-date uninfected version of the original system can be constructed.

The paper shows the implementation details for TimeVM. It also addresses many practical challenges related to how to configure and deploy TimeVM in a system in order to minimize the recovery time. We present analytical framework and extensive evaluation to validate our approach in different environments.

References

  1. http://www.rtfm.com/ssldump.Google ScholarGoogle Scholar
  2. T. F. Abdelzaher and C. Lu. Modeling and performance control of internet servers. In Proceedings of the 39th IEEE Conference on Decision and Control, volume 3, pages 2234--2239, 2000.Google ScholarGoogle ScholarCross RefCross Ref
  3. P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the art of virtualization. In SOSP '03: Proceedings of the nineteenth ACM symposium on Operating systems principles, pages 164--177, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. A. Cichocki and R. Unbehauen. Neural Networks for Optimization and Signal Processing. John Wiley and Sons, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. J. R. Crandall and T. F. Chong. Minos: Control data attack preventing orthogonal to memory model. In In Proceedings of the 37th International Symposium on Microarchitecture (MICRO), 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. R. Crandall, Z. Su, S. F. Wu, and T. F. Chong. On deriving unkown vulnerabilities from zero-day polymorphic and metamorphic worm exploits. ACM CCS, pages 235--248, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. D. A. S. de Oliveira, J. R. Crandall, G. Wassermann, S. F. Wu, Z. Su, and F. T. Chong. Execrecorder: Vm-based full-system replay for attack analysis and system recovery. In ASID '06: Proceedings of the 1st workshop on Architectural and system support for improving software dependability, pages 66--71, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. G. W. Dunlap, S. T. King, S. Cinar, M. A. Basrai, and P. M. Chen. Revirt: enabling intrusion analysis through virtual-machine logging and replay. SIGOPS Oper. Syst. Rev., 36:211--224, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. G. W. Dunlap, D. G. Lucchetti, M. A. Fetterman, and P. M. Chen. Execution replay of multiprocessor virtual machines. In VEE '08: Proceedings of the fourth ACM SIGPLAN/SIGOPS international conference on Virtual execution environments, pages 121--130, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. M. Kharbutli, X. Jiang, Y. Solihin, G. Venkataramani, and M. Prvulovic. Comprehensively and efficiently protecting the heap. ASPLOC, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. T. J. LeBlanc and J. M. Mellor-Crummey. Debugging parallel programs with instant replay. IEEE Trans. Comput., 36(4):471--482, 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. J. D. C. Little. A proof of the queueing formula l = λw. Oper. Res., p:383--387, 1961.Google ScholarGoogle Scholar
  13. M. V. Mahoney. Network traffic anomaly detection based on packet bytes. In SAC '03: Proceedings of the 2003 ACM symposium on Applied computing, pages 346--350, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. L. McVoy and C. Staelin. lmbench: Portable tools for performance analysis. In Proceedings of the USENIX, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. S. Narayanasamy, G. Pokam, and B. Calder. Bugnet: Continuously recording program execution for deterministic replay debugging. SIGARCH Comput. Archit. News, 33(2):284--295, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. I. Ray and S. Tideman. A secure tcp connection migration protocol to enable the survivability of client-server applications under malicious attack. J. Netw. Syst. Manage., 12(2):251--276, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. A. C. Snoeren, D. G. Andersen, and H. Balakrishnan. Fine-grained failover using connection migration. In USITS'01: Proceedings of the 3rd conference on USENIX Symposium on Internet Technologies and Systems, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. S. M. Srinivasan, S. Kandula, C. R. Andrews, and Y. Zhou. Flashback: a lightweight extension for rollback and deterministic replay for software debugging. In ATEC '04: Proceedings of the annual conference on USENIX Annual Technical Conference, pages 3--3, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. F. Sultan, K. Srinivasan, and L. Iftode. Migratory tcp: connection migration for service continuity in the internet. In Proceedings of the 22nd International Conference on Distributed Computing Systems, pages 469--470, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. A. Whitaker, R. S. Cox, M. Shaw, and S. D. Gribble. Rethinking the design of virtual machine monitors. IEEE Computer, 38(5):57--62, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. M. Xu, R. Bodik, and M. D. Hill. A flight data recorder for enabling full-system multiprocessor deterministic replay. SIGARCH Comput. Archit. News, 31(2):122--135, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. TimeVM: a framework for online intrusion mitigation and fast recovery using multi-time-lag traffic replay

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          ASIACCS '09: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
          March 2009
          408 pages
          ISBN:9781605583945
          DOI:10.1145/1533057

          Copyright © 2009 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 10 March 2009

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate418of2,322submissions,18%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader