skip to main content
10.1145/2382196.2382234acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Blacksheep: detecting compromised hosts in homogeneous crowds

Published:16 October 2012Publication History

ABSTRACT

The lucrative rewards of security penetrations into large organizations have motivated the development and use of many sophisticated rootkit techniques to maintain an attacker's presence on a compromised system. Due to the evasive nature of such infections, detecting these rootkit infestations is a problem facing modern organizations. While many approaches to this problem have been proposed, various drawbacks that range from signature generation issues, to coverage, to performance, prevent these approaches from being ideal solutions.

In this paper, we present Blacksheep, a distributed system for detecting a rootkit infestation among groups of similar machines. This approach was motivated by the homogenous natures of many corporate networks. Taking advantage of the similarity amongst the machines that it analyses, Blacksheep is able to efficiently and effectively detect both existing and new infestations by comparing the memory dumps collected from each host.

We evaluate Blacksheep on two sets of memory dumps. One set is taken from virtual machines using virtual machine introspection, mimicking the deployment of Blacksheep on a cloud computing provider's network. The other set is taken from Windows XP machines via a memory acquisition driver, demonstrating Blacksheep's usage under more challenging image acquisition conditions. The results of the evaluation show that by leveraging the homogeneous nature of groups of computers, it is possible to detect rootkit infestations.

References

  1. Gmer. http://www.gmer.net/, May 2012.Google ScholarGoogle Scholar
  2. Hbgary responder pro. http://www.hbgary.com/responder-pro-2, May 2012.Google ScholarGoogle Scholar
  3. Qemu website. http://qemu.org, May 2012.Google ScholarGoogle Scholar
  4. Windows academic program. http://www.microsoft.com/education/facultyconnection/articles/articledetails.aspx?cid=2416, Apr. 2012.Google ScholarGoogle Scholar
  5. A. Baliga, V. Ganapathy, and L. Iftode. Detecting kernel-level rootkits using data structure invariants. IEEE Transactions on Dependable and Secure Computing, Vol. 8, No. 5, Sept. 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. B. Blunden. The Rootkit Arsenal. Wordware Publishing, 2009. Chapter 7.9.Google ScholarGoogle Scholar
  7. M. Burdach. Finding digital evidence in physical memory. In Black Hat Federal Conference, 2006.Google ScholarGoogle Scholar
  8. M. Carbone, W. Lee, W. Cui, M. Peinado, L. Lu, and X. Jiang. Mapping kernel objects to enable systematic integrity checking. In ACM Conf. on Computer and Communications Security, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. B. Cogswell and M. Russinovich. Rootkitrevealer. http://technet.microsoft.com/en-us/sysinternals/bb897445, Nov. 2008.Google ScholarGoogle Scholar
  10. M. D. Ernst, J. H. Perkins, P. J. Guo, S. McCamant, C. Pacheco, M. S. Tschantz, and C. Xiao. The daikon system for dynamic detection of likely invariants. Science of Computer Programming, 69, Dec. 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. F. Gadaleta, N. Nikiforakis, J. Mühlberg, and W. Joosen. Hyperforce: Hypervisor-enforced execution of security-critical code. Information Security and Privacy Research, pages 126--137, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  12. F. Gadaleta, N. Nikiforakis, Y. Younan, and W. Joosen. Hello rootkitty: a lightweight invariance-enforcing framework. Information Security, pages 213--228, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. G. L. Garcia. Forensic physical memory analysis: an overview of tools and techniques. In TKK T- 110.5290 Seminar on Network Security, 2007.Google ScholarGoogle Scholar
  14. K. Griffin, S. Schneider, X. Hu, and T. cker Chiueh. Automatic generation of string signatures for malware detection.Google ScholarGoogle Scholar
  15. G. Hoglund. Rootkits: Subverting the Windows Kernel. Addison-Wesley, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. G. Jacob, H. Debar, and E. Filiol. Behavioral detection of malware: from a survey towards an established taxonomy. Journal in Computer Virology, 4:251--266, 2008. 10.1007/s11416-008-0086-0.Google ScholarGoogle ScholarCross RefCross Ref
  17. A. Kapoor and R. Mathur. Predicting the future of stealth attacks. Virus Bulletin conference, Oct. 2011.Google ScholarGoogle Scholar
  18. J. D. Kornblum. Exploiting the rootkit paradox with windows memory analysis. International Journal of Digital Evidence, 2006.Google ScholarGoogle Scholar
  19. J. D. Kornblum. Using every part of the buffalo in windows memory analysis. Digital Investigation, Mar. 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Z. Li, M. Sanghi, Y. Chen, M. yang Kao, and B. Chavez. Hamsa: fast signature generation for zero-day polymorphic worms with provable attack resilience. In SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy, pages 32--47. IEEE Computer Society, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. M. H. Ligh. Volatility malware plugins. http://code.google.com/p/malwarecookbook.Google ScholarGoogle Scholar
  22. Z. Lin, J. Rhee, X. Zhang, D. Xu, and X. Jiang. Siggraph: Brute force scanning of kernel data structure instances using graph-based signatures. In the 17th Network and Distributed System Security Symposium, 2011.Google ScholarGoogle Scholar
  23. McAfee. Mcafee deepsafe. http://www.mcafee.com/us/solutions/mcafee-deepsafe.aspx, 2011.Google ScholarGoogle Scholar
  24. Microsoft. Kernel patch protection: Faq. http://msdn.microsoft.com/en-us/windows/hardware/gg487353, Sept. 2007.Google ScholarGoogle Scholar
  25. N. L. Petroni, J. Timothy, F. Aaron, W. William, and A. Arbaugh. An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. In Proceedings of the USENIX Security Symposium, pages 289--304, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. M. E. Russinovich and D. A. Solomon. Windows Internals. Microsoft, 5th edition, June 2009.Google ScholarGoogle Scholar
  27. J. Rutkowska. Rootkits vs. stealth by design malware. https://www.blackhat.com/presentations/bh-europe-06/bh-eu-06-Rutkowska.pdf, 2006.Google ScholarGoogle Scholar
  28. J. Rutkowska. Beyond the cpu: Defeating hardware based ram acquisition (part i: Amd case). In Black Hat DC, 2007.Google ScholarGoogle Scholar
  29. A. Schuster. Pool allocations as an information source in windows memory forensics. In Pool Allocations as an Information Source in Windows Memory Forensics, 2006.Google ScholarGoogle Scholar
  30. A. Schuster. Searching for processes and threads in microsoft windows memory dumps. In Digital Investigation, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. A. Seshadri, M. Luk, N. Qu, and A. Perrig. Secvisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity oses, 2007.Google ScholarGoogle Scholar
  32. R. Treit. Some observations on rootkits. http://blogs.technet.com/b/mmpc/archive/2010/01/07/some-observations-on-rootkits.aspx, Jan. 2010.Google ScholarGoogle Scholar
  33. D. Wagner. Mimicry attacks on host-based intrusion detection systems. Proceedings of the 9th ACM conference on computer and communications security, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. A. Walters. The volatility framework: Volatile memory artifact extraction utility framework. https://www. volatilesystems.com/default/volatility.Google ScholarGoogle Scholar
  35. Z. Wang, X. Jiang, W. Cui, and P. Ning. Countering kernel rootkits with lightweight hook protection. In ACM Conf. on Computer and Communications Security, Nov. 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Y. Xie, H. Kim, D. O'Hallaron, M. Reiter, and H. Zhang. Seurat: A pointillist approach to anomaly detection. In Recent Advances in Intrusion Detection, pages 238--257. Springer, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  37. H. Yin, P. Poosankam, S. Hanna, and D. Song. Hookscout: Proactive binary-centric hook detection. In Proceedings of the 7th Conference on Detection of Intrusions and Malware & Vulnerability Assessment, Bonn, Germany, July 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Blacksheep: detecting compromised hosts in homogeneous crowds

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CCS '12: Proceedings of the 2012 ACM conference on Computer and communications security
        October 2012
        1088 pages
        ISBN:9781450316514
        DOI:10.1145/2382196

        Copyright © 2012 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 16 October 2012

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate1,261of6,999submissions,18%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader