TY - JOUR
T1 - Detecting and guarding against kernel backdoors through packet flow differentials
AU - Lee, Cheolho
AU - Sohn, Kiwook
PY - 2007
Y1 - 2007
N2 - In this paper, we present a novel technique to detect and defeat kernel backdoors which cannot be identified by conventional security solutions. We focus on the fact that since the packet flows of common network applications go up and down through the whole network subsystem but kernel backdoors utilize only the lower layers of the subsystem, we can detect kernel backdoors by employing two host-based monitoring sensors (one at higher layer and the other at lower layer) and by inspecting the packet flow differentials. We also provide strategies to mitigate false positives and negatives and to defeat kernel backdoors. To evaluate the effectiveness of the proposed technique, we implemented a detection system (KbGuard) and performed experiments in a simulated environment. The evaluation results indicate that our approach can effectively detect and deactivate kernel backdoors with a high detection rate. We also believe that our research can help prevent stealthy threats of kernel backdoors.
AB - In this paper, we present a novel technique to detect and defeat kernel backdoors which cannot be identified by conventional security solutions. We focus on the fact that since the packet flows of common network applications go up and down through the whole network subsystem but kernel backdoors utilize only the lower layers of the subsystem, we can detect kernel backdoors by employing two host-based monitoring sensors (one at higher layer and the other at lower layer) and by inspecting the packet flow differentials. We also provide strategies to mitigate false positives and negatives and to defeat kernel backdoors. To evaluate the effectiveness of the proposed technique, we implemented a detection system (KbGuard) and performed experiments in a simulated environment. The evaluation results indicate that our approach can effectively detect and deactivate kernel backdoors with a high detection rate. We also believe that our research can help prevent stealthy threats of kernel backdoors.
KW - Backdoors
KW - Kernel-mode backdoors
KW - Network monitoring
KW - Rootkits
UR - http://www.scopus.com/inward/record.url?scp=67651046018&partnerID=8YFLogxK
U2 - 10.1093/ietcom/e90-b.10.2638
DO - 10.1093/ietcom/e90-b.10.2638
M3 - Article
AN - SCOPUS:67651046018
SN - 0916-8516
VL - E90-B
SP - 2638
EP - 2645
JO - IEICE Transactions on Communications
JF - IEICE Transactions on Communications
IS - 10
ER -