scispace - formally typeset
Search or ask a question
Author

Ramkumar Chinchani

Other affiliations: Cisco Systems, Inc.
Bio: Ramkumar Chinchani is an academic researcher from University at Buffalo. The author has contributed to research in topics: Insider threat & Insider. The author has an hindex of 10, co-authored 17 publications receiving 524 citations. Previous affiliations of Ramkumar Chinchani include Cisco Systems, Inc..

Papers
More filters
Proceedings ArticleDOI
28 Jun 2005
TL;DR: This paper describes a modeling methodology which captures several aspects of insider threat, and subsequently, shows threat assessment methodologies to reveal possible attack strategies of an insider.
Abstract: Insider attacks are a well-known problem acknowledged as a threat as early as 1980s. The threat is attributed to legitimate users who abuse their privileges, and given their familiarity and proximity to the computational environment, can easily cause significant damage or losses. Due to the lack of tools and techniques, security analysts do not correctly perceive the threat, and hence consider the attacks as unpreventable. In this paper, we present a theory of insider threat assessment. First, we describe a modeling methodology which captures several aspects of insider threat, and subsequently, show threat assessment methodologies to reveal possible attack strategies of an insider.

149 citations

Journal Article
TL;DR: It is argued that exploit code is characterized by more than just a byte pattern because, in addition, there is a definite control and data flow.
Abstract: A common way by which attackers gain control of hosts is through remote exploits. A new dimension to the problem is added by worms which use exploit code to self-propagate, and are becoming a commonplace occurrence. Defense mechanisms exist but popular ones are signature-based techniques which use known byte patterns, and they can be thwarted using polymorphism, metamorphism and other obfuscations. In this paper, we argue that exploit code is characterized by more than just a byte pattern because, in addition, there is a definite control and data flow. We propose a fast static analysis based approach which is essentially a litmus test and operates by making a distinction between data, programs and program-like exploit code. We have implemented a prototype called styx and evaluated it against real data collected at our organizational network. Results show that it is able to detect a variety of exploit code and can also generate very specific signatures. Moreover, it shows initial promise against polymorphism and metamorphism.

103 citations

Proceedings ArticleDOI
26 Jun 2006
TL;DR: This paper proposes a novel approach to detect phishing attacks using fake responses which mimic real users, essentially, reversing the role of the victim and the adversary.
Abstract: Phishing scams pose a serious threat to end-users and commercial institutions alike. Email continues to be the favorite vehicle to perpetrate such scams mainly due to its widespread use combined with the ability to easily spoof them. Several approaches, both generic and specialized, have been proposed to address this problem. However, phishing techniques, growing in ingenuity as well as sophistication, render these solutions weak. In this paper we propose a novel approach to detect phishing attacks using fake responses which mimic real users, essentially, reversing the role of the victim and the adversary. Our prototype implementation called PHONEY, sits between a user's mail transfer agent (MTA) and mail user agent (MUA) and processes each arriving email for phishing attacks. Using live email data collected over a period of eight months we demonstrate data that our approach is able to detect a wider range of phishing attacks than existing schemes. Also, the performance analysis study shows that the implementation overhead introduced by our tool is very negligible.

71 citations

Book ChapterDOI
07 Sep 2005
TL;DR: In this paper, the authors argue that exploit code is characterized by more than just a byte pattern because there is a definite control and data flow and propose a fast static analysis based approach which is essentially a litmus test and operates by making a distinction between data, programs and program-like exploit code.
Abstract: A common way by which attackers gain control of hosts is through remote exploits. A new dimension to the problem is added by worms which use exploit code to self-propagate, and are becoming a commonplace occurrence. Defense mechanisms exist but popular ones are signature-based techniques which use known byte patterns, and they can be thwarted using polymorphism, metamorphism and other obfuscations. In this paper, we argue that exploit code is characterized by more than just a byte pattern because, in addition, there is a definite control and data flow. We propose a fast static analysis based approach which is essentially a litmus test and operates by making a distinction between data, programs and program-like exploit code. We have implemented a prototype called styx and evaluated it against real data collected at our organizational network. Results show that it is able to detect a variety of exploit code and can also generate very specific signatures. Moreover, it shows initial promise against polymorphism and metamorphism.

64 citations

Book ChapterDOI
28 Jan 2007
TL;DR: The feasibility of applying CAGs to insider threat analysis is demonstrated by demonstrating the design and operation of an information-centric, graphics-oriented tool called ICMAP, which enables an analyst without any theoretical background to apply C AGs to answer security questions about vulnerabilities and likely attack scenarios.
Abstract: Capability acquisition graphs (CAGs) provide a powerful framework for modeling insider threats, network attacks and system vulnerabilities. However, CAG-based security modeling systems have yet to be deployed in practice. This paper demonstrates the feasibility of applying CAGs to insider threat analysis. In particular, it describes the design and operation of an information-centric, graphics-oriented tool called ICMAP. ICMAP enables an analyst without any theoretical background to apply CAGs to answer security questions about vulnerabilities and likely attack scenarios, as well as to monitor network nodes. This functionality makes the tool very useful for attack attribution and forensics.

27 citations


Cited by
More filters
Proceedings Article
01 Jan 2002
TL;DR: In this paper, an algorithm for generating attack graphs using model checking as a subroutine is presented, which allows analysts to decide which minimal set of security measures would guarantee the safety of the system.
Abstract: An attack graph is a succinct representation of all paths through a system that end in a state where an intruder has successfully achieved his goal. Today Red Teams determine the vulnerability of networked systems by drawing gigantic attack graphs by hand. Constructing attack graphs by hand is tedious, error-prone, and impractical for large systems. By viewing an attack as a violation of a safety property, we can use off-the-shelf model checking technology to produce attack graphs automatically: a successful path from the intruder's viewpoint is a counterexample produced by the model checker In this paper we present an algorithm for generating attack graphs using model checking as a subroutine. Security analysts use attack graphs for detection, defense and forensics. In this paper we present a minimization analysis technique that allows analysts to decide which minimal set of security measures would guarantee the safety of the system. We provide a formal characterization of this problem: we prove that it is polynomially equivalent to the minimum hitting set problem and we present a greedy algorithm with provable bounds. We also present a reliability analysis technique that allows analysts to perform a simple cost-benefit trade-off depending on the likelihoods of attacks. By interpreting attack graphs as Markov Decision Processes we can use the value iteration algorithm to compute the probabilities of intruder success for each attack the graph.

467 citations

Book ChapterDOI
25 Aug 2008
TL;DR: The challenges of this problem and current approaches and techniques pursued by the research community for insider attack detection are described, and directions for future research are suggested.
Abstract: This paper surveys proposed solutions for the problem of insider attack detection appearing in the computer security research literature. We distinguish between masqueraders and traitors as two distinct cases of insider attack. After describing the challenges of this problem and highlighting current approaches and techniques pursued by the research community for insider attack detection, we suggest directions for future research.

327 citations

Journal ArticleDOI
TL;DR: McPAD (multiple classifier payload-based anomaly detector), a new accurate payload- based anomaly detection system that consists of an ensemble of one-class classifiers that is very accurate in detecting network attacks that bear some form of shell-code in the malicious payload.

296 citations

Journal ArticleDOI
Daniel Bilar1
TL;DR: It is found that malware opcode distributions differ statistically significantly from non-malicious software, and rare opcodes seem to be a stronger predictor, explaining 12 63% of frequency variation.
Abstract: This paper discusses a detection mechanism for malicious code through statistical analysis of opcode distributions A total of 67 malware executables were sampled statically disassembled and their statistical opcode frequency distribution compared with the aggregate statistics of 20 non-malicious samples We find that malware opcode distributions differ statistically significantly from non-malicious software Furthermore, rare opcodes seem to be a stronger predictor, explaining 12 63% of frequency variation

281 citations

Proceedings Article
31 Jul 2006
TL;DR: This paper introduces a new class of polymorphic attacks, called polymorphic blending attacks, that can effectively evade byte frequency-based network anomaly IDS by carefully matching the statistics of the mutated attack instances to the normal profiles.
Abstract: A very effective means to evade signature-based intrusion detection systems (IDS) is to employ polymorphic techniques to generate attack instances that do not share a fixed signature. Anomaly-based intrusion detection systems provide good defense because existing polymorphic techniques can make the attack instances look different from each other, but cannot make them look like normal. In this paper we introduce a new class of polymorphic attacks, called polymorphic blending attacks, that can effectively evade byte frequency-based network anomaly IDS by carefully matching the statistics of the mutated attack instances to the normal profiles. The proposed polymorphic blending attacks can be viewed as a subclass of the mimicry attacks. We take a systematic approach to the problem and formally describe the algorithms and steps required to carry out such attacks. We not only show that such attacks are feasible but also analyze the hardness of evasion under different circumstances. We present detailed techniques using PAYL, a byte frequency-based anomaly IDS, as a case study and demonstrate that these attacks are indeed feasible. We also provide some insight into possible countermeasures that can be used as defense.

280 citations