TY - GEN
T1 - Patrol
T2 - 18th European Symposium on Research in Computer Security, ESORICS 2013
AU - Dai, Jun
AU - Sun, Xiaoyan
AU - Liu, Peng
PY - 2013
Y1 - 2013
N2 - Identifying attack paths in enterprise network is strategically necessary and critical for security defense. However, there has been insufficient efforts in studying how to identify an attack path that goes through unknown security holes. In this paper, we define such attack paths as zero-day attack paths, and propose a prototype system named Patrol to identify them at runtime. Using system calls, Patrol builds a network-wide system object dependency graph that captures dependency relations between OS objects, and identifies suspicious intrusion propagation paths in it as candidate zero-day attack paths through forward and backward tracking from intrusion symptoms. Patrol further identifies highly suspicious candidates among these paths, by recognizing indicators of unknown vulnerability exploitations along the paths through rule-based checking. Our evaluation shows that Patrol can work accurately and effectively at runtime with an acceptable performance overhead.
AB - Identifying attack paths in enterprise network is strategically necessary and critical for security defense. However, there has been insufficient efforts in studying how to identify an attack path that goes through unknown security holes. In this paper, we define such attack paths as zero-day attack paths, and propose a prototype system named Patrol to identify them at runtime. Using system calls, Patrol builds a network-wide system object dependency graph that captures dependency relations between OS objects, and identifies suspicious intrusion propagation paths in it as candidate zero-day attack paths through forward and backward tracking from intrusion symptoms. Patrol further identifies highly suspicious candidates among these paths, by recognizing indicators of unknown vulnerability exploitations along the paths through rule-based checking. Our evaluation shows that Patrol can work accurately and effectively at runtime with an acceptable performance overhead.
UR - http://www.scopus.com/inward/record.url?scp=84884782055&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84884782055&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-40203-6_30
DO - 10.1007/978-3-642-40203-6_30
M3 - Conference contribution
AN - SCOPUS:84884782055
SN - 9783642402029
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 536
EP - 555
BT - Computer Security, ESORICS 2013 - 18th European Symposium on Research in Computer Security, Proceedings
Y2 - 9 September 2013 through 13 September 2013
ER -