Tamper-resistant, application-aware blocking of malicious network connections

55Citations
Citations of this article
29Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Application-level firewalls block traffic based on the process that is sending or receiving the network flow. They help detect bots, worms, and backdoors that send or receive malicious packets without the knowledge of users. Recent attacks show that these firewalls can be disabled by knowledgeable attackers. To counter this threat, we develop VMwall, a fine-grained tamper-resistant process-oriented firewall. VMwall's design blends the process knowledge of application-level firewalls with the isolation of traditional stand-alone firewalls. VMwall uses the Xen hypervisor to provide protection from malware, and it correlates TCP or UDP traffic with process information using virtual machine introspection. Experiments show that VMwall successfully blocks numerous real attacks-bots, worms, and backdoors-against a Linux system while allowing all legitimate network flows. VMwall is performant, imposing only a 0-1 millisecond delay on TCP connection establishment, less than a millisecond delay on UDP connections, and a 1-7% slowdown on network-bound applications. Our attack analysis argues that with the use of appropriate external protection of guest kernels, VMwall's introspection remains robust and helps identify malicious traffic. © 2008 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Srivastava, A., & Giffin, J. (2008). Tamper-resistant, application-aware blocking of malicious network connections. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5230 LNCS, pp. 39–58). https://doi.org/10.1007/978-3-540-87403-4_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free