• DocumentCode
    1807618
  • Title

    PolyVaccine: Protecting Web Servers against Zero-Day, Polymorphic and Metamorphic Exploits

  • Author

    Campo-Giralte, Luis ; Jimenez-Peris, Ricardo ; Patino-Martinez, Marta

  • Author_Institution
    Fac. de Inf., Univ. Politec. de Madrid, Madrid, Spain
  • fYear
    2009
  • fDate
    27-30 Sept. 2009
  • Firstpage
    91
  • Lastpage
    99
  • Abstract
    Today Web servers are ubiquitous having become critical infrastructures of many organizations. However, they are still one of the most vulnerable parts of organizations infrastructure. Exploits are many times used by worms to fast propagate across the full Internet being Web servers one of their main targets. New exploit techniques have arouse in the last few years that have rendered useless traditional IDS techniques based on signature identification. Exploits use polymorphism (code encryption) and metamorphism (code obfuscation) to evade detection from signature-based IDSs. In this paper, we address precisely the topic of how to protect Web servers against zero-day (new), polymorphic, and metamorphic malware embedded in data streams (requests) that target Web servers. We rely on a novel technique to detect harmful binary code injection (i.e., exploits) in HTTP requests that is more efficient than current techniques based on binary code emulation or instrumentation of virtual engines. The detection of exploits is done through sandbox processes. The technique is complemented by another set of techniques such as caching, and pooling, to reduce its cost to neglectable levels.Our technique has little assumptions regarding the exploit unlike previous approaches that assume the existence of sled or getPC code, loops, read of the payload, writes to different addresses, etc. The evaluation shows that caching is highly effective and that the average latency introduced by our system is neglectable.
  • Keywords
    Internet; cache storage; cryptography; digital signatures; file servers; invasive software; telecommunication security; HTTP request; Internet; PolyVaccine; Web server protection; binary code emulation; cache storage; code encryption; code obfuscation; harmful binary code injection detection; malware; metamorphic exploit; polymorphic exploit; sandbox process; signature-based IDS; virtual engine instrumentation; worms; zero-day exploit; Binary codes; Computer worms; Cryptography; Emulation; Instruments; Internet; Intrusion detection; Protection; Search engines; Web server; exploit; metamorphic malware; polymorphic malware; vulnerability; web server; zero-day malware;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Reliable Distributed Systems, 2009. SRDS '09. 28th IEEE International Symposium on
  • Conference_Location
    Niagara Falls, NY
  • ISSN
    1060-9857
  • Print_ISBN
    978-0-7695-3826-6
  • Type

    conf

  • DOI
    10.1109/SRDS.2009.15
  • Filename
    5283421