Correlating multi-session attacks via replay

  • Authors:
  • Fareha Shafique;Kenneth Po;Ashvin Goel

  • Affiliations:
  • Electrical and Computer Engineering, University of Toronto;Electrical and Computer Engineering, University of Toronto;Electrical and Computer Engineering, University of Toronto

  • Venue:
  • HotDep'06 Proceedings of the Second conference on Hot topics in system dependability
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Intrusion analysis is a manual and time-consuming operation today. It is especially challenging because attacks often span multiple sessions which makes it is hard to diagnose all the damage caused by an attack. One approach for determining dependencies between the sessions of an attack is system-call taint analysis, but this method can generate large numbers of false dependencies due to shared objects such as a password file. In this paper, we propose a novel solution to this problem that replays sessions with tainted and untainted inputs and reasons about multisession dependencies by comparing the session's outputs in the two cases. We present some initial experiments that show that this approach is promising and may allow building powerful intrusion analysis and recovery systems.