skip to main content
10.1145/2714576.2714613acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Discover and Tame Long-running Idling Processes in Enterprise Systems

Authors Info & Claims
Published:14 April 2015Publication History

ABSTRACT

Reducing attack surface is an effective preventive measure to strengthen security in large systems. However, it is challenging to apply this idea in an enterprise environment where systems are complex and evolving over time. In this paper, we empirically analyze and measure a real enterprise to identify unused services that expose attack surface. Interestingly, such unused services are known to exist and summarized by security best practices, yet such solutions require significant manual effort.

We propose an automated approach to accurately detect the idling (most likely unused) services that are in either blocked or bookkeeping states. The idea is to identify repeating events with perfect time alignment, which is the indication of being idling. We implement this idea by developing a novel statistical algorithm based on autocorrelation with time information incorporated. From our measurement results, we find that 88.5% of the detected idling services can be constrained with a simple syscall-based policy, which confines the process behaviors within its bookkeeping states. In addition, working with two IT departments (one of which is a cross validation), we receive positive feedbacks which show that about 30.6% of such services can be safely disabled or uninstalled directly. In the future, the IT department plan to incorporate the results to build a "smaller" OS installation image. Finally, we believe our measurement results raise the awareness of the potential security risks of idling services.

References

  1. Bugs: Ubuntu. https://bugs.launchpad.net/ubuntu.Google ScholarGoogle Scholar
  2. Common vulnerabilities and exposures. http://cve.mitre.org/cve/.Google ScholarGoogle Scholar
  3. Cve vulnerabilities: file with the write mode. http://cve.mitre.org/cgi--bin/cvekey.cgi?keyword=file+write+mode.Google ScholarGoogle Scholar
  4. Cve vulnerabilities: remote ports. http://cve.mitre.org/cgi--bin/cvekey.cgi?keyword=remote+port.Google ScholarGoogle Scholar
  5. Cve vulnerabilities: unix domain sockets. http://cve.mitre.org/cgi--bin/cvekey.cgi?keyword=unix+domain+socket.Google ScholarGoogle Scholar
  6. Guide to network programming. http://beej.us/guide/bgnet/output/html/multipage/advanced.html.Google ScholarGoogle Scholar
  7. How to remove geoclue-master? http://ubuntuforums.org/showthread.php?t=1957331.Google ScholarGoogle Scholar
  8. The linux audit framework. https://www.suse.com/documentation/sled10/audit_sp1/data/book_sle_audit.html.Google ScholarGoogle Scholar
  9. MSDN best practices for security. http://msdn.microsoft.com/en-us/library/ms912889(v=winembedded.5).aspx.Google ScholarGoogle Scholar
  10. Securing a linux desktop part 1: removing unwanted services. http://www.ihackforfun.eu/index.php?title=improve-security-by-removing-services&more=1&c=1&tb=1&pb=1.Google ScholarGoogle Scholar
  11. Start irqbalance by default? http://ubuntu.5.x6.nabble.com/Start-irqbalance-by-default-td732222.html.Google ScholarGoogle Scholar
  12. Survey at penn state university. https://sites.google.com/site/lipzip15/survey.Google ScholarGoogle Scholar
  13. System administrator - security best practices. http://www.sans.org/reading-room/whitepapers/bestprac/system-administrator-security-practices-657.Google ScholarGoogle Scholar
  14. what is avahi-daemon? http://forums.fedoraforum.org/showthread.php?t=124837.Google ScholarGoogle Scholar
  15. What's this at-spi-registryd? https://blogs.oracle.com/jmcp/entry/what_s_this_at_spi.Google ScholarGoogle Scholar
  16. D. Chakrabarti, Y. Wang, C. Wang, J. Leskovec, and C. Faloutsos. Epidemic thresholds in real networks. ACM Trans. Inf. Syst. Secur., 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. H. Chan, M. Ceyko, and L. Ortiz. Interdependent defense games: Modeling interdependent security under deliberate attacks. In In Proceedings of the Twenty-Eighth Conference on Uncertainty in Artificial Intelligence (UAI), 2012.Google ScholarGoogle Scholar
  18. C. Chatfield. The analysis of time series: an introduction. CRC press, 2013.Google ScholarGoogle Scholar
  19. A. Frossi, F. Maggi, G. L. Rizzo, and S. Zanero. Selecting and improving system call models for anomaly detection. In DIMVA, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. S. Guha, J. Chandrashekar, N. Taft, and K. Papagiannaki. How healthy are today's enterprise networks? In Proceedings of the 8th ACM SIGCOMM Conference on Internet Measurement, IMC '08. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. S. A. Hofmeyr, S. Forrest, and A. Somayaji. Intrusion detection using sequences of system calls. In Journal of Computer Security, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. J. Homer, X. Ou, and D. Schmidt. A sound and practical approach to quantifying security risk in enterprise networks. Technical Report (2009): 1--15, Kansas State University.Google ScholarGoogle Scholar
  23. A. P. Kosoresow and S. A. Hofmeyr. Intrusion detection via system call traces. In IEEE Software, '97. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. A. Kurmus, R. Tartler, D. Dorneau, B. Heinloth, V. Rothberg, A. Ruprecht, W. Sch Aüder-Preikschat, D. Lohmann, and R. Kapitza. Attack surface metrics and automated compile-time os kernel tailoring. In NDSS 2013.Google ScholarGoogle Scholar
  25. K. H. Lee, X. Zhang, and D. Xu. High accuracy attack provenance via binary-based execution partition. In Proceedings of the 2013 Network and Distributed System Security Symposium (NDSS'13).Google ScholarGoogle Scholar
  26. F. Maggi, M. Matteucci, and S. Zanero. Detecting intrusions through system call sequence and argument analysis. IEEE Transactions on Dependable and Secure Computing, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. P. K. Manadhata and J. M. Wing. An attack surface metric. In IEEE Transactions on Software Engineering (2011), pages 371--386. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. J. Reich, M. Goraczko, A. Kansal, and J. Padhye. Sleepless in seattle no longer. In USENIX Annual Technical Conference (ATC), 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. A. Rényi. On measures of entropy and information. In Fourth Berkeley Symposium on Mathematical Statistics and Probability, pages 547--561, 1961.Google ScholarGoogle Scholar
  30. R. Sekar, M. Bendre, D. Dhurjati, and P. Bollineni. A fast automaton-based method for detecting anomalous program behaviors. In IEEE Symposium on Security and Privacy, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. J. Szefer, E. Keller, R. B. Lee, and J. Rexford. Eliminating the hypervisor attack surface for a more secure cloud. CCS, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. H. Vijayakumar, G. Jakka, S. Rueda, J. Schiffman, and T. Jaeger. Integrity walls: Finding attack surfaces from mandatory access control policies. ASIACCS '12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. H. Vijayakumar, J. Schiffman, and T. Jaeger. Sting: Finding name resolution vulnerabilities in programs. In Proceedings of the 21st USENIX Security, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. H. Vijayakumar, J. Schiffman, and T. Jaeger. Process firewalls: Protecting processes during resource access. In Proceedings of the 8th ACM European Conference on Computer Systems (EUROSYS 2013), April 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. C. Warrender, S. Forrest, and B. Pearlmutter. Detecting intrusions using system calls: Alternative data models. In IEEE Symposium on Security and Privacy, 1999.Google ScholarGoogle ScholarCross RefCross Ref
  36. Q. Zeng, J. Rhee, H. Zhang, N. Arora, G. Jiang, and P. Liu. Deltapath: Precise and scalable calling context encoding. In Proceedings of Annual IEEE/ACM International Symposium on Code Generation and Optimization, New York, NY, USA, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Discover and Tame Long-running Idling Processes in Enterprise Systems

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        ASIA CCS '15: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security
        April 2015
        698 pages
        ISBN:9781450332453
        DOI:10.1145/2714576

        Copyright © 2015 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 14 April 2015

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        ASIA CCS '15 Paper Acceptance Rate48of269submissions,18%Overall Acceptance Rate418of2,322submissions,18%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader