Auditing Frameworks Need Resource Isolation: A Systematic Study on the Super Producer Threat to System Auditing and Its Mitigation

07/29/2023
by   Peng Jiang, et al.
0

System auditing is a crucial technique for detecting APT attacks. However, attackers may try to compromise the system auditing frameworks to conceal their malicious activities. In this paper, we present a comprehensive and systematic study of the super producer threat in auditing frameworks, which enables attackers to either corrupt the auditing framework or paralyze the entire system. We analyze that the main cause of the super producer threat is the lack of data isolation in the centralized architecture of existing solutions. To address this threat, we propose a novel auditing framework, NODROP, which isolates provenance data generated by different processes with a threadlet-based architecture design. Our evaluation demonstrates that NODROP can ensure the integrity of the auditing frameworks while achieving an average 6.58 application overhead compared to a state-of-the-art commercial auditing framework, Sysdig across eight different hardware configurations.

READ FULL TEXT
research
04/16/2010

Behavioural Correlation for Detecting P2P Bots

In the past few years, IRC bots, malicious programs which are remotely c...
research
06/02/2020

Threat Detection and Investigation with System-level Provenance Graphs: A Survey

With the development of information technology, the border of the cybers...
research
06/04/2023

Discussion Paper: The Threat of Real Time Deepfakes

Generative deep learning models are able to create realistic audio and v...
research
03/07/2021

Threat Modeling of Cyber-Physical Systems in Practice

Traditional Cyber-physical Systems(CPSs) were not built with cybersecuri...
research
09/08/2023

Penetrating Shields: A Systematic Analysis of Memory Corruption Mitigations in the Spectre Era

This paper provides the first systematic analysis of a synergistic threa...
research
06/09/2022

Software Mitigation of RISC-V Spectre Attacks

Speculative attacks are still an active threat today that, even if initi...
research
06/15/2022

Designing a Provenance Analysis for SGX Enclaves

Intel SGX enables memory isolation and static integrity verification of ...

Please sign up or login with your details

Forgot password? Click here to reset