Experiences using minos as a tool for capturing and analyzing novel worms for unknown vulnerabilities

13Citations
Citations of this article
25Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We present a honeypot technique based on an emulated environment of the Minos architecture [1] and describe our experiences and observations capturing and analyzing attacks. The main advantage of a Minos-enabled honeypot is that exploits based on corrupting control data can be stopped at the critical point where control flow is hijacked from the legitimate program, facilitating a detailed analysis of the exploit. Although Minos hardware has not yet been implemented, we are able to deploy Minos systems with the Bochs full system Pentium emulator. We discuss complexities of the exploits Minos has caught that are not accounted for in the simple model of "buffer overflow exploits" prevalent in the literature. We then propose the Epsilon-Gamma-Pi model to describe control data attacks in a way that is useful towards understanding polymorphic techniques. This model can not only aim at the centers of the concepts of exploit vector (ε), bogus control data (γ), and payload (π) but also give them shape. This paper will quantify the polymorphism available to an attacker for γ and π, while so characterizing ε is left for future work. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Crandall, J. R., Wu, S. F., & Chong, F. T. (2005). Experiences using minos as a tool for capturing and analyzing novel worms for unknown vulnerabilities. In Lecture Notes in Computer Science (Vol. 3548, pp. 32–50). Springer Verlag. https://doi.org/10.1007/11506881_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free