4
World Congress on Internet Security (WorldCIS-2013) Securing Computer Networks by Networking Multiple OS kernels. (Revisting Network Securi: Protecting Computer Networks from Malwares) Divyajyoti Das (Author) Bachelor in Technology, School of Computer Science & Engineering Kalinga Institute of Industrial Technology( KIlT University) Bhubaneswar, Orissa, India [email protected] Abstract- Only in the past decade, malwares have assumed the identity of menace among the users of the information security highway. With their populace gone up beyond measure in the recent years, absolute protection from them is a question of ongoing research. The problem becomes more serious when it is a networked based environment. Starting from servers to clients, malwares can certainly create havoc in a networked environment. Networking among computer provides malwares with an easy mode of transport. They can easily transfer from one system to another, thus infecting several systems in no time. Numerous technologies have been employed to counter their threat. However, immunizations with these technologies keep being devised. Present scenario calls for technologies that hit the very base on which the spread of malwares in a networked environment stands. With the malware industry letting out new variants of malwares to infect large computer networks at an incredible pace, it has become imperative in the present to come up with strategies so as to counter their threat. With every new malware coming into picture, new technologies are designed to combat them and the reverse unfortunately stands true. The present scenario demands fresh technologies which strike the roots on how malwares enter a network and consequently spread inside it. The malwares have to be checked from the entry point itself because once they find a place inside the network, they can create innumerable places for them to hide. The mechanism to counter malwares in a networked environment proposed in this paper, checks the entry of malwares right from the entry point of a network itself. The architecture powered by networking among multiple OS kernels and cloud computing will certainly be a progressive step in controlling the malware menace among computer networks. Keywords-network; alware; keel; architecture; threat I. INTRODUCTION Computer Networks form the core pipeline of data ansfer in many organizations across the globe. Starting om small coorate houses to multinational corporations, networking is the tool that keeps systems connected, thus making data om one system accessible to another. In the scenario where the 978-1-908320-22/3/$25.00©2013 IEEE Somesh Nanda (Author) Bachelor in Technology, Department of Computer Science & Engineering. C.V Raman College of Engineering Bhubaneswar, Orissa, India mode world cannot be imagined without computer networks, security of computer networks becomes a key issue. The growing size of computer networks rther adds to the security of computer networks. Like the computer networks industry; the malware indusy has also grown which continually challenges the security of computer networks across the globe. Malware writers continuously design malwares to specifically affect large computer networks; correspondingly the cyber security industry. The proposed architecture in this paper is an attempt to design a mechanism that will bring this battle to an end, providing complete security to computer networks against malwares. II. DEPENDANCE OF MALWARES ON OPERATING SYSTEMS Having caied out extensive study of on malware behavior, we now come to a very simple observation, providing ample providence as a combating means. Our study on present malware scenario reveals the extensive use of as specific system and API calls carried by malicious codes for detection evasion and payload execution on client systems. For example, the Gnorug family variants make use of QueryInformationProcessO API while a few earlier ones used the IsDebuggerPresentO API to check for running debugger processes. Rootkits of all kinds similarly, extensively use as specific system calls(Raymond Roberts, 2008). Such are the methods employed by malwares to make unauthorized modifications to a system and to intercept a scanners' proper execution. In fact, information about the as and its version on the target system is a vital piece of information every attacker seeks prior to system invasion. It is this simple observation that can be used for file recovery om an infected system and which forms the base for our prototype to secure computers connected in a network, described in the rest of the paper. III. PROPOSED SECURE ARCHITECTURE The proposed secure architecture basically works upon the modeling of an exteal ( remote wall) which makes use of parallel scanning of malicious code over different as keels, thus rendering replication, self- mutation and debugging interference ineffective. The simple reason being that 95

[IEEE 2013 World Congress on Internet Security (WorldCIS) - London, United Kingdom (2013.12.9-2013.12.12)] World Congress on Internet Security (WorldCIS-2013) - Securing computer networks

  • Upload
    somesh

  • View
    213

  • Download
    1

Embed Size (px)

Citation preview

World Congress on Internet Security (WorldCIS-2013)

Securing Computer Networks by Networking

Multiple OS kernels. (Revisting Network Security: Protecting Computer Networks from Malwares)

Divyajyoti Das (Author) Bachelor in Technology, School of Computer Science &

Engineering Kalinga Institute of Industrial Technology( KIlT University)

Bhubaneswar, Orissa, India [email protected]

Abstract- Only in the past decade, malwares have assumed

the identity of menace among the users of the information

security highway. With their populace gone up beyond measure

in the recent years, absolute protection from them is a question of

ongoing research. The problem becomes more serious when it is a

networked based environment. Starting from servers to clients,

malwares can certainly create havoc in a networked

environment. Networking among computer provides malwares

with an easy mode of transport. They can easily transfer from

one system to another, thus infecting several systems in no time.

Numerous technologies have been employed to counter their

threat. However, immunizations with these technologies keep

being devised. Present scenario calls for technologies that hit the

very base on which the spread of malwares in a networked

environment stands.

With the malware industry letting out new variants of

malwares to infect large computer networks at an incredible

pace, it has become imperative in the present to come up with

strategies so as to counter their threat. With every new malware

coming into picture, new technologies are designed to combat

them and the reverse unfortunately stands true. The present

scenario demands fresh technologies which strike the roots on

how malwares enter a network and consequently spread inside it.

The malwares have to be checked from the entry point itself

because once they find a place inside the network, they can create

innumerable places for them to hide.

The mechanism to counter malwares in a networked

environment proposed in this paper, checks the entry of

malwares right from the entry point of a network itself. The

architecture powered by networking among multiple OS kernels

and cloud computing will certainly be a progressive step in

controlling the malware menace among computer networks.

Keywords-network; rnalware; kernel; architecture; threat

I. INTRODUCTION

Computer Networks form the core pipeline of data transfer in many organizations across the globe. Starting from small corporate houses to multinational corporations, networking is the tool that keeps systems connected, thus making data from one system accessible to another. In the scenario where the

978-1-908320-22/3/$25.00©2013 IEEE

Somesh Nanda (Author) Bachelor in Technology, Department of Computer Science

& Engineering. C.V Raman College of Engineering

Bhubaneswar, Orissa, India

modern world cannot be imagined without computer networks, security of computer networks becomes a key issue. The growing size of computer networks further adds to the security of computer networks. Like the computer networks industry; the mal ware industry has also grown which continually challenges the security of computer networks across the globe. Malware writers continuously design mal wares to specifically affect large computer networks; correspondingly the cyber security industry. The proposed architecture in this paper is an attempt to design a mechanism that will bring this battle to an end, providing complete security to computer networks against malwares.

II. DEPENDANCE OF MALWARES ON OPERATING SYSTEMS

Having carried out extensive study of on mal ware behavior, we now come to a very simple observation, providing ample providence as a combating means. Our study on present malware scenario reveals the extensive use of as specific system and API calls carried by malicious codes for detection evasion and payload execution on client systems. For example, the Gnorug family variants make use of QueryInformationProcessO API while a few earlier ones used the IsDebuggerPresentO API to check for running debugger processes. Rootkits of all kinds similarly, extensively use as specific system calls(Raymond Roberts, 2008). Such are the methods employed by malwares to make unauthorized modifications to a system and to intercept a scanners' proper execution. In fact, information about the as and its version on the target system is a vital piece of information every attacker seeks prior to system invasion. It is this simple observation that can be used for file recovery from an infected system and which forms the base for our prototype to secure computers connected in a network, described in the rest of the paper.

III. PROPOSED SECURE ARCHITECTURE

The proposed secure architecture basically works upon the modeling of an external ( remote wall) which makes use of parallel scanning of malicious code over different as kernels, thus rendering replication, self- mutation and debugging interference ineffective. The simple reason being that

95

World Congress on Internet Security (WorldCIS-2013)

mal wares, Trojans, Rootkits etc. regularly make use of system calls, modification of System files and other such activities which are as specific. Operating on a different as kernel altogether, these call amount to nothing and all attempts to evade detection fail.

Checksum viruses, though obsolete can provide grounds for a simple example. In the checksum mechanism of virus detection, a database of file sizes in the file system is maintained which are constantly monitored by Anti-virus software. A virus that might attach itself to another file, tends to increase its size by some amount. This increase when compared with database records can be detected. Now, the checksum viruses simply made apt changes to the file-size counter to shadow their presence. Now if the scanning procedure in this case was adopted on a UNIX kernel, the viruses would require a different code altogether, with variations in system calls for the same effect, and can hence be detected.

The proposed model consists of a remote system standing an intermediate between the host and the client systems much like an external firewall. Under this model, an intermediary data monitor is visible to the host as the client and vice versa . This monitoring system operates on the data being transferred among the two parties to "filter" it of malware files and to prohibit any illegal access to remote systems. The transfer of data is so done that the intervention from the data monitor is almost not felt.

This remote data monitor comprises of a central storage device connected to a high-speed internet pathway like a backbone. This storage device can be an external cache with a huge storage capacity sufficient enough to serve files to a bunch of local networks connected at the client end. Now , suppose a file transfer has been agreed upon by the client and the host, in normal terms the file would be broken down into data packets and would be sent over the internet to the client in random order where they would be reassembled into the original data with the help of packet sequence numbers attached to each packet header. However, better security can be achieved if the role of the client in this regard is transferred upon to the remote wall. The data would thus be transferred to the external cache of the remote server where it would temporarily reside before being redirected to the client system. This participation from the remote wall is not felt if high speed internet connection can be ensured for the remote storage device.

The external storage device resides in a server which has a fixed number of nodes or terminals radiating from it. Each of these terminals has different as kernels running. It may not be the as in its full functionality, but simply its core that runs on each of these ass running, the terminals access the transferred data simultaneously from the external cache. This file is then examined for the presence of malicious code. The examination techniques can involve signature detection, fmgerprint matching, decryption methods and other traditional procedures on these independent platforms. A relatively novel technique in this trade has been the use of VMs to monitor viral activities in file under real-timed environment. However, even this technology made way for malwares with escalated abilities to

978-1-908320-22/3/$25.00©2013 IEEE

sense if they are being run on virtual environment. They then may intercept the monitoring mechanisms being employed or may stop their execution all-together ( Ferrie, P,2006 ). This vulnerability can be done away with when the codes are not on virtual but on authentic platforms themselves. Their activity monitoring can hence be based on fully functional systems which lack the facilities of Virtual Machines. With the scans running on separate as kernels, these terminal systems can communicate with each other using a set of techniques described later in the paper.

Terminal I Running OS I

Tcnninal2 Running OS 2

bltermediate R-wall

. . . . . .

?l o v

..

..

. � Client 4

Fig 1- "Network Layout"

r )t

Server Running Coordinating OS

Terminal J Running OS 3 Tcnninal4

RunmngOS 4

Redirection to Client

Terminal 6 Running OS 6

Terminal 5 Running as 5

Fig 2- "Remote Wall Layout"

96

World Congress on Internet Security (WorldCIS-2013)

Once the scanning process arrives at completion, malicious action can be detected by monitoring the platform which the malware code affects. The code might then resist removal by intercepting the scanner's detection procedures. In that case, the file can simply be cleaned on a separate platform where it lacks leverage. As such, payload operations of newer and unknown viruses can be determined and their signatures obtained. Now, in another mode of operation, the results drawn from inspection by different terminals can be compared to check for discrepancies. In scenarios like the checksum viruses discussed above, the scan result under the susceptible OS would show disagreement with others giving away the presence of malicious program.

The file thus having been scanned is "filtered" by the above process by removing harmful parts of it. This would be done if which are noxious (which is a very general case). However, if the file in question is in itself some mal ware implementation, then the file itself is removed from the cache and all connections between the client and the host are terminated. With the whole process driven to completion, the file now free of malicious program, is redirected to the client. The whole mechanism works the other way round when the role of the host and client reverses i.e. the direction of data transfer reverses.

IV. TECHNICAL ISSUES

For the proposed model to assume some credibility a few short-comings have to be addressed.

Clearly, the procedures described above would require a great deal of computational power for it to avoid delay in data transfer for various reasons. The first being, the parallel scanning of every transferred file over multiple networks which would consume most of the processing power. Now this would again depend on the size of the file being scanned which may vary from a few KBs to some GBs. Hence keeping the performance insufficient would considerably hamper transfer rate, while keeping performance level immensely high would mean a waste wherein smaller file sizes are being considered. However, with new age "Cloud computing" now at our disposal, this situation is no more a bane. Depending on the file size, computing power can be obtained "On demand" and released with completion of required operations.

Another quandary that we [md ourselves in is the ability to handle the networking of various operating systems sice it requires distributed parallel processing in each of the kernels as well as a common platform linking the kernel for efficient results. For this purpose we have employed the use of a virtual machine control program which includes a data transfer mechanism. The different kernels comprising our system shall possess a storage and communications region along with a buffer memory. The data transfer mechanism shall handle communications by data transfer from buffer areas of the storage regions of the kernels on the basis of requests made by any kernel. The communications between the operating systems require the actual connection of the communication units of the different OS to the virtual machine or simulating the communication unit by a virtual machine control program. This design efficiency handles parallel processing between the

978-1-908320-22/3/$25.00©2013 IEEE

operating systems with high speed communication as is required by our proposition. The system block diagrams explaining the mechanism of read and write functions of two operating systems separately have been included. These mechanisms handle the communication part based on the read/write requests or queries from one OS to another. For example in the I sl figure, a write request is generated in the lSI operating system. The communication procedure part in the first OS converts the request in the form of proper protocols and transfers it.

On receiving the request, the data transfer mechanism in the virtual machine control system transfers data from the buffer regions of the I sl and 2nd OS. On the complete of the transfer, the data transfer mechanism issues a notification of the same to the first operating system. If the first OS holds a read request from the second operating system, it communicates the same with the data transfer mechanism, which then makes a transfer between the buffers of OS2 and OS!. On completion of the transfer, the data transfer mechanism notifies the operating systems of the same. In this manner the read/write mechanisms operate in conformance with the communication procedure. In this manner, the communication between the different operating systems can be achieved for the purpose of scanning the user's system on various platforms simultaneously. The virtual machine control program enables actual operating systems to efficiently communicate rapidly, providing the passage for the detection of any mal ware present in the system written for any OS platform. The example provided can be extended to any number of OS keeping a single virtual machine control program. Since the design doesn't require the installation or network generation for each OS to make a communication, it can effectively handle the numerous OS.

z '-

REOEPTION

OSI21

REAO .. tlF 22 � I '---62 AEAO PROclSSS

--INT OOMMUNlCATION HANOl.oa:n PROCEOURS nl1Q

( OA"A REtQ) ---- G 'fr

ot.\mmsg INSTAUCTIOti

r-----}l. � RcOU£sr COMPlEr[

FIG.lA

32 -'

31,

tlt"NJ�I$jtDN

,42 41_

.52 51-

8 OAT" 'l'f1MISI�ElR � 8� MEC!!

OS(IJ APPLH I BUFF' ,--- r-f!!!ill!- COMPLS'fJON

WRITE NOTIPICA'rI -

-'-t _ 21

wnn'g PROCESS ,-.L COi.4MUNICATION INT PAOCSounB REQ HANOJ,.]?!R ( DATA TRAtlSMrT 1

JI. \J- '--:---OTAONOSIl: INSTRUCTION

n iJ ===n R£Q 1'101.0 I-!-

ON

I ACTf.VII'TF.

DAt!A TrlANSF'ftn I'l'1.'EAFWI'· LlE:CfI

97

World Congress on Internet Security (WorldCIS-2013) COMPI-ETION NOTIFICATION 22

OS(�� . r 1flo't BUFF -

READ

IfCC£PrtON

f- -62, nEAD PROCESS

INT COMMUNICATION HANDI-ER PROCSDURB RBQ

( DATA RgQ)

�' --�-1f

FIG. IS 32 31 --...,

MAIN sro/YJIJ£ .r;t;;!!.r' �!'I,('$!JCN

42 4/ -

__ 52 5/ --

21

OSO) ) ----, fWOU oo� f WRITt

...---' It

WRITE PROCESS

CO�MUNIOATION PRoc.oune REQ ( DATA TRANSMIT

{). if DIAO"OSI!: DIAONOSO

L61

IN'!: JiANDLER

,-- __ �I�NS ���U���l�O�H ______________ �IN�S�TR�U���I�ON� ____ --. ACTIVATE �_�_-_1f __ -=--=--=--=--=-.--- ----- {).-if INTERRUPT �R [�O !!..HO�L :':O __ """:=I ___ �fI�[0r:...:::C O�"P':.L�O':.E_ -I

���� TRANSFER _ 8 8 ���� TRANSPER

VIRTUA� MACHINE CONTno� PRoonA.

V. ADV ANT AGES

?

With the suggested diagnosis, a system over a network can experience better levels of security for the following reasons:

There is no direct connection established between the client and the host systems. This takes away a good leverage from a malicious user over a remote system. With the remote wall inspecting the file before it even reaches the destination, the security of the packets which arrive at the receiving end can be ensured. In certain cases, mal ware code even though detectable, delivers its payload well before detection i.e. on the instance of its entry into the target system. Such a scene in this case can be avoided.

One reason behind the propagation of malwares despute escalations in newer methods and virus databases is lack of effort from the client's end. Virus databases need to be updated every now and then to register latest [mdings. However, not every system over the internet updates its antivirus software at required frequency. Now with the systems connected to the remote wall server which would regularly update its database, this need on the user's part is a swept away.

Ordinary systems over a network can exploit advanced scanning facilities without having to install anti-virus software or compromising their system performance.

978-1-908320-22/3/$25.00©2013 IEEE

VI. EXPERIMENTAL RES UL TS

A prototype of the architecture discussed above was designed and implemented on a network of computers. Initially a network of five computers was connected and gradually the number of computers was increased. The client systems were used to access the internet and data was also transferred from one system to another. The client systems were not protected by any anti-virus software and their security totally depended on the architecture proposed above. The systems were checked for infection after every 24 hours. The process was continued for a fortnight. In the end, basing on the observations the success rate was found to be 99%. The I % infection that was observed in the systems was very weak.

VII. CONCLUSION

There's no lock which cannot be cracked, but a one with a fewer faults is always reliable. With the malware authors digging out brand new methods to bypass the security of computer networks every passing hour, an absolute protection to computer networks can be little assured. However, technology to hinder their attacks to a sustainable degree by preventing malware outbreaks before they occur can prove a surpassing step in the battle. The secured architecture mentioned is a new and innovative solution in this aspect. From the experiments that we have conducted and the research that has been done while designing the secured architecture to protect computer networks, we firmly believe that it can be the next generation answer in securing computer networks from cyber criminals.

VIII. REFERENCES

[I] MAL WARE DEVELOPMENT LIFE CYCLE by Raymond Roberts

[2] Ferrie, P. Attacks on virtual machine emulators. Proceedings of the A V AR Conference, 2006.

[3] The Unofficial guide to ethical hacking ,by Ankit Fadia.

[4] G. Dhillion, S. Moores, 2001 "Computer crimes: theorizing about the enemy within", In Computers & Security, volume 20, number 8,pp. 715-723.

[5] Hinde, S. "Spyware: the spy in computer", Computer Fraud & Security, Vol. 2004, Issue 12, ppI5-16.

[6] NETWORK SECURITY & CRYPOGRAPHY by Fourouzan.

98