Detecting and guarding against kernel backdoors through packet flow differentials

Cheolho Lee, Kiwook Sohn

Research output: Contribution to journalArticlepeer-review

Abstract

In this paper, we present a novel technique to detect and defeat kernel backdoors which cannot be identified by conventional security solutions. We focus on the fact that since the packet flows of common network applications go up and down through the whole network subsystem but kernel backdoors utilize only the lower layers of the subsystem, we can detect kernel backdoors by employing two host-based monitoring sensors (one at higher layer and the other at lower layer) and by inspecting the packet flow differentials. We also provide strategies to mitigate false positives and negatives and to defeat kernel backdoors. To evaluate the effectiveness of the proposed technique, we implemented a detection system (KbGuard) and performed experiments in a simulated environment. The evaluation results indicate that our approach can effectively detect and deactivate kernel backdoors with a high detection rate. We also believe that our research can help prevent stealthy threats of kernel backdoors.

Original languageEnglish
Pages (from-to)2638-2645
Number of pages8
JournalIEICE Transactions on Communications
VolumeE90-B
Issue number10
DOIs
StatePublished - 2007

Keywords

  • Backdoors
  • Kernel-mode backdoors
  • Network monitoring
  • Rootkits

Fingerprint

Dive into the research topics of 'Detecting and guarding against kernel backdoors through packet flow differentials'. Together they form a unique fingerprint.

Cite this