ETRI-Knowledge Sharing Plaform

ENGLISH

성과물

논문 검색
구분 SCI
연도 ~ 키워드

상세정보

학술대회 Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri Nets
Cited 4 time in scopus Download 1 time Share share facebook twitter linkedin kakaostory
저자
Ryan Iwahashi, Daniela A.S. de Oliveira, S. Felix Wu, Jedidiah R. Crandall, 허영준, 오진태, 장종수
발행일
200809
출처
International Conference on Information Security (ISC) 2008 (LNCS 5222), v.5222, pp.114-130
DOI
https://dx.doi.org/10.1007/978-3-540-85886-7_8
협약과제
08MS2100, Network 위협의 Zero-Day Attack 대응을 위한 실시간 공격 Signature 생성 및 관리 기술개발, 장종수
초록
With the increased popularity of polymorphic and register spring attacks, exploit signatures intrusion detection systems (IDS) can no longer rely only on exploit signatures. Vulnerability signatures that pattern match based on properties of the vulnerability instead of the exploit should be employed. Recent research has proposed three classes of vulnerability signatures but its approach cannot address complex vulnerabilities such as the ASN.1 Double-Free. Here we introduce Petri nets as a new class of vulnerability signature that could potentially be used to detect other types of vulnerabilities. Petri nets can be automatically generated and are represented as a graph making it easier to understand and debug. We analyzed it along side the three other classes of vulnerability signatures in relation to the Windows ASN.1 vulnerability. The results were very promising due to the very low false positive rate and 0% false negative rate. We have shown that Petri nets are a very efficient, concise, and effective way of describing signatures (both vulnerability and exploit). They are more powerful than regular expressions and still efficient enough to be practical. Comparing with the other classes, only Turing machines provided a better identification rate but they incur significant performance overhead. © 2008 Springer-Verlag Berlin Heidelberg.
KSP 제안 키워드
False negative rate, Identification rate, Intrusion Detection Systems(IDSs), Intrusion detection system(IDS), Low false positive rate, Pattern match, Performance Overhead, Petri net(PN), Regular Expressions, Turing machines, vulnerability signature