Shield

作者: Helen J. Wang , Chuanxiong Guo , Daniel R. Simon , Alf Zugenmaier

DOI: 10.1145/1015467.1015489

关键词: Computer scienceComputer securityProtocol stackExploitSoftwareSet (psychology)Vulnerability

摘要: Software patching has not been effective as a first-line defense against large-scale worm attacks, even when patches have long available for their corresponding vulnerabilities. Generally, people reluctant to patch systems immediately, because are perceived be unreliable and disruptive apply. To address this problem, we propose in the network stack, using shields -- vulnerability-specific, exploit-generic filters installed end once vulnerability is discovered, but before applied. These examine incoming or outgoing traffic of vulnerable applications, correct that exploits Shields less install uninstall, easier test bad side effects, hence more reliable than traditional software patches. Further, resilient polymorphic metamorphic variations [43].In paper, show concept feasible by describing prototype Shield framework implementation above transport layer. We designed safe restrictive language describe vulnerabilities partial state machines application. The expressiveness verified encoding signatures several known vulnerabilites. Our evaluation provides evidence Shield's low false positive rate small impact on application throughput. An examination sample set suggests could used prevent exploitation substantial fraction most dangerous ones.

参考文章(41)
Jim Ohlund, Anthony Jones, Network Programming for Microsoft Windows ,(1999)
Brad Karp, Hyang-Ah Kim, Autograph: toward automated, distributed worm signature detection usenix security symposium. pp. 19- 19 ,(2004)
Jim Ohlund, Anthony Jones, Network Programming for Microsoft Windows with Cdrom Microsoft Press. ,(2002)
Vern Paxson, Stuart Staniford, Nicholas Weaver, Stefan Savage, Colleen Shannon, David Moore, The Spread of the Sapphire/Slammer Worm ,(2003)
Vern Paxson, Stuart Staniford, Nicholas Weaver, How to Own the Internet in Your Spare Time usenix security symposium. pp. 149- 167 ,(2002)
Niels Provos, A virtual honeypot framework usenix security symposium. pp. 1- 1 ,(2004)
Vern Paxson, Bro: a system for detecting network intruders in real-time Computer Networks. ,vol. 31, pp. 2435- 2463 ,(1999) , 10.1016/S1389-1286(99)00112-7
Cristian Estan, George Varghese, Stefan Savage, Sumeet Singh, The EarlyBird System for Real-time Detection of Unknown Worms ,(2005)