230 likes | 362 Vues
This interim report outlines the design and implementation of a VM-based endpoint firewall. As the Internet grows, secure computing has become paramount due to vulnerabilities in widely used PCs, which face threats from malware and social engineering. The project utilizes a Virtual Machine Monitor (VMM) for enhanced monitoring and isolation. By implementing firewall functionalities within a lightweight VMM layer, the solution aims to efficiently manage network operations while safeguarding against attacks, providing better performance compared to traditional systems.
E N D
VMM Based End Point Firewall Raghunathan Srinivasan Advanced Computer Network Security Project Interim Report
Overview • Introduction • Need for secure computing • Related Work • Work done in VM based monitoring • Design • Current Status • Evaluation Criteria
Introduction • The Internet is a shared resource • Consists of millions of machines all over the world • Internet is now widely accepted and used for variety of applications • An Indirect consequence of this has been that PC have gained popularity
Uses of PC • The popular uses of PC’s are • Online Banking • Online Transactions • Communication • PC’s are used to authenticate a person • Shared Secret Problem • Can be stolen by malware
Software Vulnerability • A PC may contain miscellaneous, uncertified software • It is very difficult to discover and eliminate bugs in standardized and well documented software • It is very difficult to teach humans to create bug free code • Software will have bugs, and they will continue to get exploited
Exploits • Vulnerabilities in software layers are exploited by attackers to gain control of user machines • Hackers also use social engineering to trick users into installing malicious software • Prompting user to install a plug-in • Another trick is to send malware as part of e-mail attachments
Security Software • Anti-virus • Detects malicious code in the system • Not effective, can detect only known viruses • Firewall • Can be patched as it resides within the Operating System • Rootkits can bypass firewall and install their own network drivers
Disabling Firewall • W32/Bagz worm • Installs itself on a PC by means of social engineering trick • It proceeds to install its own network driver to bypass firewall • It then opens a backdoor to download and receive files
Disabling firewall … • Win32.Bagle.AU • Spreads through file sharing • Primarily through P2P networks • This worm can rename itself from one infection to another • It patches other programs to execute from another address space • It opens a backdoor on port 81 to download files from remote and receive commands
Disabling Firewall • Vulnerabilities in software allow attackers to provide inputs that cause error in software services that shut-down the firewall • sending unexpected data in the datagram packets • application that handles this data crashes • cascading effect on other Windows applications including firewall
VMM – Virtual Machine Monitor • Used for • installation management • simulation • software testing • Emergence of powerful desktops allows VMM to be incorporated into security solutions • VMM can offer security & Isolation • VMWare, XEN, LGuest, VirtualPC
VMM uses • Used to detect rootkits • Can be used to hide information • Private Keys • Credit card info • Can be used to restrict device access to a particular machine • A VM can be designated to use only particular devices and applications
Design Details • Attempt to implement a end point firewall along with its policies inside the VM layer • XEN and Ubuntu Linux will be used to implement the firewall • XEN is a type I VM • XEN is a very bulky software layer. It contains many modules for para-virtualization, OS scheduling, device management
Design • Implement a stripped down version of the VM that handles network operations • Conceptually similar to Microsoft’s VM • The advantage of this implementation is that the thin VMM layer containing only the firewall functionalities offers much better performance than a full fledged Hypervisor with multiple guests and a root partition
Design Applications OS Kernel VMM layer Firewall Detects anomalous network requests Hardware
Requirements • All network policies need to be installed inside the VMM. • These policies should not be configurable from within the OS running inside • Since network calls are passed through the VMM, it can monitor all traffic into and out of the operating system • Ensures against any malicious rootkit that opens up ports on the system
Requirements • a virus may patch on an existing application such as the browser • use it to open a port that the browser would not normally use • This attack is difficult to contain • this attack can be mitigated by specifying the ports that an application would normally use
Prevent Social Engineering? • A popular social engineering technique is to construct websites that look similar to popular banking sites • trick the customer into revealing his/her private secret • the user can be asked to enter the list of websites that are frequently visited • The user can also be asked to enter his/her interest category • A web search for these categories can be done to maintain a list of popular websites that deal with them
Preventing social engineering • If a user attempts to access any domain that is outside that of the specified interest area firewall denies connection • This also will block websites that open due to accidental clicking on advertisements
Current Status • Installed XEN on a machine • Reading documents as to how to modify the code
Evaluation Criteria • The system will be under attack from various rootkits • Can assume the presence of a rootkit detector • Preventing Buffer Overflows are difficult for the scope of this project • The ability of the system to detect any software that is opening an unauthorized port will be the most critical evaluation criteria • The firewall should be able to deny such a request • The firewall should also be able to detect if a program is attempting to bypass the installed network drivers • Performance of the system should not get impacted by more than 10 % in terms of • memory utilized, cpu overhead
Deliverables • Finish coding before start of November second week • Finish testing before November 2nd week ends • Project report Due on November 14th