patrol: revealing zero-day attack paths through network...

18
Patrol: Revealing Zero-day Attack Paths through Network-wide System Object Dependencies Jun Dai, Xiaoyan Sun, and Peng Liu College of Information Sciences and Technology Pennsylvania State University, University Park, PA 16802 [email protected], [email protected], [email protected] Abstract. Identifying attack paths in enterprise network is strategically necessary and critical for security defense. However, there has been in- sufficient efforts in studying how to identify an attack path that goes through unknown security holes. In this paper, we define such attack paths as zero-day attack paths, and propose a prototype system named Patrol to identify them at runtime. Using system calls, Patrol builds a network-wide system object dependency graph that captures dependency relations between OS objects, and identifies suspicious intrusion prop- agation paths in it as candidate zero-day attack paths through forward and backward tracking from intrusion symptoms. Patrol further identifies highly suspicious candidates among these paths, by recognizing indica- tors of unknown vulnerability exploitations along the paths through rule- based checking. Our evaluation shows that Patrol can work accurately and effectively at runtime with an acceptable performance overhead. 1 Introduction 1.1 Zero-day Attack Paths When deploying enterprise network security defense, it is important to consider multi-step attacks. Given that today’s network is usually under basic protection from security deployments like firewall and IDS, it’s not easy for attackers to directly break into their final target. Instead, determined attackers patiently compromise other intermediate hosts as stepping-stones. That is, attackers often have to go through an attack path before they achieve their goal. An attack path is a sequence of vulnerability exploits on compromised hosts. It’s necessary and critical to find the attack paths hidden in the network. Web Server DMZ Firewall Intranet NFS Server (UNFS3) SSH Server (OpenSSL 0.9.8g) Database Server DNS Server Email Server Workstation 2 (bzip2 1.0.5) DMZ Inside Internet Intranet Firewall Inside Firewall Attacker Bruteforce NFS mount Workstation 1 (Linux kernel 2.6.24) Trojan-horses Fig. 1: An example attack scenario. Suppose that a host is compro- mised by a local or remote exploit. If this exploit is enabled by a known vulnerability, it’s not zero-day. If this exploit is enabled by an unknown vul- nerability, it is zero-day. If an attack path includes one or more zero-day exploits, it is a zero-day attack path. Fig. 1 illustrates an example at- tack scenario including three steps. Step 1, a brute-force key guessing attack is used to exploit CVE-2008-0166 on SSH Server to gain root privilege. Step 2, the export table on NFS Server is inappropriately configured to allow any user to share files through a public directory (/exports ), so two crafted trojan-horses are uploaded to this directory.

Upload: phungphuc

Post on 10-May-2018

219 views

Category:

Documents


2 download

TRANSCRIPT

Patrol: Revealing Zero-day Attack Paths throughNetwork-wide System Object Dependencies

Jun Dai, Xiaoyan Sun, and Peng Liu

College of Information Sciences and TechnologyPennsylvania State University, University Park, PA 16802

[email protected], [email protected], [email protected]

Abstract. Identifying attack paths in enterprise network is strategicallynecessary and critical for security defense. However, there has been in-sufficient efforts in studying how to identify an attack path that goesthrough unknown security holes. In this paper, we define such attackpaths as zero-day attack paths, and propose a prototype system namedPatrol to identify them at runtime. Using system calls, Patrol builds anetwork-wide system object dependency graph that captures dependencyrelations between OS objects, and identifies suspicious intrusion prop-agation paths in it as candidate zero-day attack paths through forwardand backward tracking from intrusion symptoms. Patrol further identifieshighly suspicious candidates among these paths, by recognizing indica-tors of unknown vulnerability exploitations along the paths through rule-based checking. Our evaluation shows that Patrol can work accuratelyand effectively at runtime with an acceptable performance overhead.

1 Introduction

1.1 Zero-day Attack Paths

When deploying enterprise network security defense, it is important to considermulti-step attacks. Given that today’s network is usually under basic protectionfrom security deployments like firewall and IDS, it’s not easy for attackers todirectly break into their final target. Instead, determined attackers patientlycompromise other intermediate hosts as stepping-stones. That is, attackers oftenhave to go through an attack path before they achieve their goal. An attack pathis a sequence of vulnerability exploits on compromised hosts. It’s necessary andcritical to find the attack paths hidden in the network.

Web

Server

DMZ

Firewall

Intranet

NFS Server

(UNFS3)

SSH Server

(OpenSSL 0.9.8g)

Database

Server

DNS

Server

Email

Server

Workstation 2

(bzip2 1.0.5)

DMZ

Inside

Internet

Intranet

Firewall

Inside

Firewall

Attacker

Bruteforce

NFS mount

Workstation 1

(Linux kernel 2.6.24)

Trojan-horses

Fig. 1: An example attack scenario.

Suppose that a host is compro-mised by a local or remote exploit.If this exploit is enabled by a knownvulnerability, it’s not zero-day. If thisexploit is enabled by an unknown vul-nerability, it is zero-day. If an attackpath includes one or more zero-dayexploits, it is a zero-day attack path.

Fig. 1 illustrates an example at-tack scenario including three steps.Step 1, a brute-force key guessing attack is used to exploit CVE-2008-0166on SSH Server to gain root privilege. Step 2, the export table on NFS Serveris inappropriately configured to allow any user to share files through a publicdirectory (/exports), so two crafted trojan-horses are uploaded to this directory.

2 Jun Dai, Xiaoyan Sun, and Peng Liu

The trojan-horses contain exploit code of CVE-2009-2692 and CVE-2011-4089.Step 3, once a trojan-horse file is mounted and installed by an innocent user likeWorkstation 1 or 2, arbitrary code is executed to create a hidden channel. Hence,two attack paths exist: p1{CVE-2008-0166, NFS misconfiguration, CVE-2009-2692} and p2{CVE-2008-0166, NFS misconfiguration, CVE-2011-4089}. Let’sassume the time now is August 1, 2009, then CVE-2008-0166 becomes the onlyknown vulnerability. If the attackers are still able to exploit all the vulnerabilitiesin this scenario, then p1 and p2 both become zero-day attack paths.

Zero-day exploit problem is so important and challenging. Zero-day attackpath problem is beyond zero-day exploit problem. This paper aims to take thefirst steps to address the zero-day attack path problem.

1.2 Possible Solutions

The literature is explored for possible solutions of zero-day attack path problem.However, we find that no existing technique can well address this problem dueto the unknown nature of zero-day attack path.

Attack graph [1–3]. By considering vulnerabilities in combination (not merelyin isolation), attack graph can generate attack paths that show exploit sequencesto specific attack goals. But, this notion has been primarily applied to modelcausality dependencies among known vulnerabilities. Unknown vulnerabilitiesare not captured and zero-day attack paths will accordingly be missing in attackgraph. Notable exceptions are recent research [4] [5], which have pioneered theattack graph based analysis and modeling of zero-day vulnerabilities. However,a solution to identify zero-day attack paths at runtime is further expected.

Penetration test [6–8]. This solution uses real exploits to reveal some specu-lated attack paths. It requires huge knowledge and operation input from humanintelligence. Hence, the cost is usually too expensive. Besides, the attack pathsin their discovery are largely known ones, because it’s very difficult to exploitunknown vulnerabilities in penetration tests.

Alert correlation [9] [10]. This solution correlates isolated alerts to form po-tential attack paths. Although it has potentials to be automatic and inexpensive,it may induce high false rates. The false rates are twofold: 1) The correlationitself is inaccurate because it attempts to integrate possibly different contextsinto a unified “story”; 2) The alerts that the correlation largely depends on ge-netically inherit false rates from security sensors like IDS. When the two folds offalse rates are combined together, the accuracy of the whole solution gets worse.

Techniques to detect zero-day exploits may help the identification of zero-dayattack path, such as anomaly detection [11–18] and specification-based detection[19] [20]. By profiling normal behavior and detecting deviations, these techniquesare capable of detecting novel exploits. However, they are hard to cope withfalse positives. Besides, the identification of novel exploits doesn’t mean theidentification of zero-day attack paths. As pointed above, IDS alert correlationneeds to be involved and thus introduces one more fold of false rates.

1.3 Key Insights and Our Approach

This paper leverages a different strategy to identify the zero-day attack paths.Instead of first collecting vulnerabilities or alerts and then correlating them into

Patrol 3

paths, we first try to build a superset graph and identify the suspicious intrusionpropagation paths hidden in it as candidate zero-day attack paths, and thenrecognize the highly suspicious candidates among these paths. Interested readerscan refer to Fig. 2 for an example of a superset graph (Fig. 2a) and the suspiciousintrusion propagation paths (Fig. 2b) hidden in it.

We make this decision for four key insights: 1) As the only way for programsto interact with OS, system calls are found hard-to-avoid and attack neutral;2) We find that a network-wide superset graph can be generated from systemcalls, and zero-day attack paths are showing themselves in it. This graph is alsoattack neutral. It exists no matter whether any vulnerability is exploited or not;3) The superset graph is inherently a set of paths. We find a way to get its ap-propriate subsets as candidate zero-day attack paths. These paths actually andnaturally correlate vulnerability exploitations, different from the logical correla-tion in attack graph; 4) The candidate zero-day attack paths expose unknownvulnerability exploitations along them, and thus can orientate us to recognizesuch exploitations. With these paths serving as network-wide attack context, theaccuracy and performance of detecting unknown vulnerability exploitations canbe better than the detection with only isolated per-host context.

The following summarizes our main contributions:

1. We propose to build a network-wide system object dependency graph (SODG)as the superset graph. Built from system calls, an SODG is made up of OS ob-jects like processes/files/sockets (nodes) and dependency relations betweenthem (edges). It neutrally captures the occurrence of vulnerability exploits.

2. We propose to identify suspicious intrusion propagation paths (SIPPs) inthe network-wide SODG as candidate zero-day attack paths. The SIPPsactually and naturally correlate known/unknown vulnerability exploitations.We further coin the concepts of vulnerability shadow and shadow indicatorto help recognize the highly suspicious candidates among the SIPPs.

3. We implemented a prototype system, called Patrol, which can work accu-rately and effectively at runtime with an acceptable performance overhead.

2 Models and Assumptions

We assume a network consists of Unix-like operating systems, in which systemobjects can be mainly classified into processes, files and sockets. We propose tobuild a network-wide system object dependency graph (SODG) using systemcall traces. Since a system call is designed to be the only way to get service fromOS in modern operating systems, attackers have to talk to the system via systemcalls. Therefore, although unknown exploits could not be seen by us, they canbe seen by SODG. Fig. 2a gives an example of a 3-host SODG.

To build a network-wide SODG, we first need to construct the SODG for eachhost, namely per-host SODG. As in Definition 1, a per-host SODG is a directedgraph made up of OS objects (nodes) and dependency relations (directed edges)between them. System calls are parsed to generate these nodes and edges. Thereare several types of dependency relations. For example, system call read infersthat a process depends on a file (denoted as file→process), while write determines

4 Jun Dai, Xiaoyan Sun, and Peng LiuHost 1: SSH Server

Host 2: NFS Server

Host 3: Workstation 1

3 : ( 6 5 5 3 : 6 5 5 0 : h t t p )

4 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 5 9 8 7 6 )

2 0 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 2 5 1 4 )

2 1 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 5 1 8 5 9 )

5 : ( 2 0 8 . 6 7 . 2 2 2 . 2 2 2 : 5 3 )

6 : ( 6 5 5 2 : 6 5 5 0 : h t t p )

7 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 4 6 8 6 )

1 8 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 3 7 7 2 4 )

2 3 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 4 0 4 8 )

8 : ( 6 1 4 9 : 6 1 4 8 : b a s h )

1 1 : ( 6 5 5 8 : 6 1 4 9 : b a s h )

2 9 : ( 6 5 5 9 : 6 1 4 9 : b a s h )

2 2 3 : ( 6 6 3 4 : 6 1 4 9 : b a s h )

9 : ( / h o m e / j u n : 4 6 3 6 6 7 4 )

2 2 7 : ( 6 6 3 5 : 4 9 3 5 : s s h d )

2 4 0 : ( 6 6 3 6 : 4 9 3 5 : s s h d )

2 4 4 : ( 6 6 3 7 : 4 9 3 5 : s s h d )

2 5 0 : ( 6 6 3 8 : 4 9 3 5 : s s h d )2 5 6 : ( 6 6 3 9 : 4 9 3 5 : s s h d )

3 2 9 : ( 6 6 5 9 : 4 9 3 5 : s s h d )

3 3 5 : ( 6 6 6 0 : 4 9 3 5 : s s h d )

3 3 9 : ( 6 6 6 1 : 4 9 3 5 : s s h d )3 4 5 : ( 6 6 6 2 : 4 9 3 5 : s s h d ) 3 5 7 : ( 6 6 6 7 : 4 9 3 5 : s s h d )

3 7 9 : ( 6 6 6 9 : 4 9 3 5 : s s h d )

3 8 5 : ( 6 6 7 0 : 4 9 3 5 : s s h d )

3 8 9 : ( 6 6 7 1 : 4 9 3 5 : s s h d )

3 9 5 : ( 6 6 7 2 : 4 9 3 5 : s s h d )

4 1 1 : ( 6 6 7 7 : 4 9 3 5 : s s h d )

4 2 9 : ( 6 6 7 9 : 4 9 3 5 : s s h d )

4 3 5 : ( 6 6 8 0 : 4 9 3 5 : s s h d )

4 4 2 : ( 6 6 8 2 : 4 9 3 5 : s s h d )

4 5 0 : ( 6 6 8 5 : 4 9 3 5 : s s h d )

4 6 1 : ( 6 6 8 7 : 4 9 3 5 : s s h d )

4 7 9 : ( 6 6 9 0 : 4 9 3 5 : s s h d )

4 8 6 : ( 6 6 9 2 : 4 9 3 5 : s s h d )4 9 3 : ( 6 6 9 4 : 4 9 3 5 : s s h d )

5 0 5 : ( 6 6 9 7 : 6 6 9 6 : s s h d )

5 3 3

5 4 4

1 0 : ( / b i n / m o u n t : 9 6 6 7 2 0 )

1 2 : ( / e t c / l d . s o . c a c h e : 8 8 0 0 2 9 6 )

3 2 : ( 6 5 6 0 : 6 5 5 9 : m o u n t )

3 4 : ( 6 5 6 2 : 6 5 6 1 : m o d p r o b e )9 6 : ( 6 5 8 3 : 5 9 0 8 : a p t )

9 9 : ( 6 5 8 4 : 5 9 0 8 : a p t )

1 0 4 : ( 6 5 8 5 : 5 9 0 8 : a p t )

1 1 2 : ( 6 5 9 2 : 5 9 0 8 : a p t )

1 1 4 : ( 6 5 9 3 : 5 9 0 8 : a p t )

1 1 5 : ( 6 5 9 4 : 5 9 0 8 : a p t )

1 1 6 : ( 6 5 9 5 : 6 5 9 4 : a p t )

1 1 8 : ( 6 5 9 6 : 5 9 0 8 : a p t )

1 2 1 : ( 6 5 9 7 : 5 9 0 8 : a p t )

1 2 6 : ( 6 5 9 8 : 5 8 9 7 : r u n - p a r t s )

1 2 8 : ( 6 5 9 9 : 5 8 9 7 : r u n - p a r t s )

1 3 0 : ( 6 6 0 0 : 5 8 9 7 : r u n - p a r t s )

1 3 2 : ( 6 6 0 1 : 6 6 0 0 : l o g r o t a t e )

1 4 6 : ( 6 6 0 2 : 6 6 0 1 : l o g r o t a t e )

1 4 8 : ( 6 6 0 3 : 6 6 0 1 : l o g r o t a t e )

1 5 1 : ( 6 6 0 4 : 6 6 0 3 : s h )

1 5 4 : ( 6 6 0 6 : 6 6 0 5 : i n v o k e - r c . d )

1 5 7 : ( 6 6 0 7 : 6 6 0 5 : i n v o k e - r c . d )

1 5 9 : ( 6 6 0 9 : 6 6 0 8 : i n v o k e - r c . d )

1 6 3 : ( 6 6 1 0 : 6 6 0 8 : i n v o k e - r c . d )

1 6 4 : ( 6 6 1 1 : 6 6 1 0 : x a r g s )

1 6 7 : ( 6 6 1 3 : 6 6 1 2 : i n v o k e - r c . d )

1 6 9 : ( 6 6 1 4 : 6 6 1 2 : i n v o k e - r c . d )

1 7 0 : ( 6 6 1 5 : 6 6 1 4 : x a r g s )

1 7 2 : ( 6 6 1 7 : 6 6 1 6 : i n v o k e - r c . d )

1 7 5 : ( 6 6 1 8 : 6 6 1 6 : i n v o k e - r c . d )

1 7 6 : ( 6 6 1 9 : 6 6 1 8 : x a r g s )

1 7 7 : ( 6 6 2 0 : 6 6 0 4 : i n v o k e - r c . d ) 1 8 2 : ( 6 6 2 1 : 6 6 2 0 : c u p s y s )

1 8 5 : ( 6 6 2 2 : 6 6 2 0 : c u p s y s )

1 8 8 : ( 6 6 2 3 : 6 6 2 0 : c u p s y s )

1 9 0 : ( 6 6 2 4 : 6 6 2 0 : c u p s y s )

1 9 1 : ( 6 6 2 5 : 6 6 2 0 : c u p s y s )

1 9 2 : ( 6 6 2 6 : 6 6 2 0 : c u p s y s )

1 9 3 : ( 6 6 2 7 : 6 6 2 0 : c u p s y s )

1 9 4 : ( 6 6 2 8 : 6 6 2 0 : c u p s y s )

1 9 5 : ( 6 6 2 9 : 6 6 2 0 : c u p s y s )

1 9 7 : ( 6 6 3 0 : 6 6 2 0 : c u p s y s )

2 0 7 : ( 6 6 3 1 : 6 6 2 0 : c u p s y s )

2 1 9 : ( 6 6 3 2 : 6 6 2 0 : c u p s y s )

2 2 1 : ( 6 6 3 3 : 6 6 0 3 : s h )

2 8 0 : ( 6 6 4 6 : 5 8 9 7 : r u n - p a r t s )

2 8 3 : ( 6 6 4 8 : 6 6 4 6 : m a n - d b )

2 8 4 : ( 6 6 4 9 : 6 6 4 6 : m a n - d b )

2 8 6 : ( 6 6 5 0 : 6 6 4 9 : s h )

2 8 9 : ( 6 6 5 2 : 6 6 4 9 : s h )

2 9 3 : ( 6 6 5 4 : 6 6 4 6 : m a n - d b )

2 9 9 : ( 6 6 5 6 : 5 8 9 7 : r u n - p a r t s )

3 0 1 : ( 6 6 5 7 : 6 6 5 6 : m l o c a t e )

5 1 9

5 4 9 : ( 6 7 0 9 : 5 8 9 7 : r u n - p a r t s )

5 5 1 : ( 6 7 1 0 : 6 7 0 9 : s t a n d a r d )

5 5 2 : ( 6 7 1 1 : 6 7 0 9 : s t a n d a r d )

5 5 3 : ( 6 7 1 2 : 6 7 0 9 : s t a n d a r d )

5 5 5 : ( 6 7 1 3 : 6 7 0 9 : s t a n d a r d )

5 5 6 : ( 6 7 1 4 : 6 7 0 9 : s t a n d a r d )

5 5 8 : ( 6 7 1 5 : 6 7 0 9 : s t a n d a r d )

5 6 0 : ( 6 7 1 6 : 6 7 0 9 : s t a n d a r d )

5 6 2 : ( 6 7 1 7 : 6 7 0 9 : s t a n d a r d )

5 6 7 : ( 6 7 2 1 : 6 7 2 0 : s t a n d a r d )

5 7 0 : ( 6 7 2 2 : 6 7 2 0 : s t a n d a r d )

5 7 1 : ( 6 7 2 3 : 6 7 2 0 : s t a n d a r d )

5 7 3 : ( 6 7 2 7 : 6 7 2 5 : h e a d )

5 7 4 : ( 6 7 2 9 : 6 7 2 4 : s a v e l o g )

5 7 6 : ( 6 7 3 0 : 6 7 2 9 : s a v e l o g )

5 7 7 : ( 6 7 3 1 : 6 7 2 9 : s a v e l o g )

5 7 9 : ( 6 7 3 2 : 6 7 2 9 : s a v e l o g )

5 8 0 : ( 6 7 3 3 : 6 7 2 9 : s a v e l o g )5 8 2 : ( 6 7 3 4 : 6 7 2 9 : s a v e l o g )

5 8 4 : ( 6 7 3 5 : 6 7 2 9 : s a v e l o g )

5 8 6 : ( 6 7 3 6 : 6 7 2 9 : s a v e l o g )

5 8 8 : ( 6 7 3 7 : 6 7 2 9 : s a v e l o g )

5 9 0 : ( 6 7 3 8 : 6 7 2 9 : s a v e l o g )

5 9 2 : ( 6 7 3 9 : 6 7 2 9 : s a v e l o g )

5 9 4 : ( 6 7 4 0 : 6 7 2 9 : s a v e l o g )

5 9 6 : ( 6 7 4 1 : 6 7 2 9 : s a v e l o g )

5 9 7 : ( 6 7 4 2 : 6 7 2 9 : s a v e l o g )

5 9 9 : ( 6 7 4 3 : 6 7 2 9 : s a v e l o g )

6 0 1 : ( 6 7 4 4 : 6 7 2 9 : s a v e l o g )

6 0 2 : ( 6 7 4 5 : 6 7 2 9 : s a v e l o g )

6 0 3 : ( 6 7 4 6 : 6 7 2 9 : s a v e l o g )

6 0 4 : ( 6 7 4 7 : 6 7 2 9 : s a v e l o g )

6 0 5 : ( 6 7 4 8 : 6 7 2 9 : s a v e l o g )

6 0 6 : ( 6 7 4 9 : 6 7 2 9 : s a v e l o g )

6 0 8 : ( 6 7 5 0 : 6 7 2 9 : s a v e l o g )

6 0 9 : ( 6 7 5 1 : 6 7 2 9 : s a v e l o g )

6 1 1 : ( 6 7 5 2 : 6 7 2 9 : s a v e l o g ) 6 1 2 : ( 6 7 5 3 : 6 7 2 9 : s a v e l o g )

6 1 3 : ( 6 7 5 4 : 6 7 2 9 : s a v e l o g )

6 1 4 : ( 6 7 5 5 : 6 7 2 9 : s a v e l o g )

6 1 5 : ( 6 7 5 8 : 6 7 5 6 : g r e p )

6 1 6 : ( 6 7 5 9 : 6 7 5 6 : c a t )

6 1 7 : ( 6 7 6 1 : 6 7 6 0 : c a t )

6 1 9 : ( 6 7 6 3 : 6 7 6 0 : h e a d )

6 2 0 : ( 6 7 6 2 : 6 7 6 0 : t r )

6 2 1 : ( 6 7 6 6 : 6 7 6 4 : g r e p )

6 2 2 : ( 6 7 6 7 : 6 7 6 4 : u s p l a s h _ wr i t e )

6 2 3 : ( 6 7 6 8 : 6 7 6 4 : t p u t )

6 2 4 : ( 6 7 6 9 : 6 7 6 4 : t p u t )

6 2 5 : ( 6 7 7 0 : 6 7 6 4 : t p u t )

6 2 6 : ( 6 7 7 1 : 6 7 6 4 : t p u t )

6 2 7 : ( 6 7 7 2 : 6 7 6 4 : e x p r )

6 2 8 : ( 6 7 7 3 : 6 7 6 4 : e x p r )

6 2 9 : ( 6 7 7 4 : 6 7 6 4 : t p u t )

6 3 0 : ( 6 7 7 6 : 6 7 6 4 : c h o wn )

6 3 1 : ( 6 7 7 7 : 6 7 6 4 : c h o wn )6 3 2 : ( 6 7 7 8 : 6 7 6 4 : c h o wn )

6 3 3 : ( 6 7 7 9 : 6 7 6 4 : c h o wn )

6 3 4 : ( 6 7 8 0 : 6 7 6 4 : c h o wn )

6 3 5 : ( 6 7 8 1 : 6 7 6 4 : c h o wn ) 6 3 6 : ( 6 7 8 2 : 6 7 6 4 : c h o wn )6 3 7 : ( 6 7 8 3 : 6 7 6 4 : c h o wn )

6 3 8 : ( 6 7 8 4 : 6 7 6 4 : c h o wn )

6 3 9 : ( 6 7 8 5 : 6 7 6 4 : c h o wn )

6 4 0 : ( 6 7 8 6 : 6 7 6 4 : c h o wn )

6 4 1 : ( 6 7 8 7 : 6 7 6 4 : c h o wn )

6 4 2 : ( 6 7 8 8 : 6 7 6 4 : s t a r t - s t o p - d a e m )

6 4 4 : ( 6 7 8 9 : 6 7 6 4 : u s p l a s h _ wr i t e )

6 4 5 : ( 6 7 9 0 : 6 7 6 4 : t p u t )

1 3 : ( / p r o c / 6 5 5 8 / m o u n t s : 1 9 8 5 9 )

1 4 : ( / e t c / l o c a l e . a l i a s : 8 7 9 8 3 7 0 )

1 5 : ( / e t c / m t a b : 8 7 9 8 3 9 7 )

1 6 : ( / p r o c / f i l e s y s t e m s : 4 0 2 6 5 3 1 8 4 4 )

5 0 0 : ( 6 6 9 6 : 6 6 7 9 : s s h d )

5 4 3

1 7 ( / m n t )

1 9 : ( 2 0 8 . 6 7 . 2 2 0 . 2 2 0 : 5 3 )

2 2 : ( 1 3 0 . 2 0 3 . 1 3 5 . 4 5 : 5 3 )

2 4 : ( 5 3 8 1 : 1 : c r o n )

2 5 : ( / e t c / c r o n t a b : 8 7 9 8 3 4 2 )

2 6 : ( / e t c / c r o n . d : 8 7 9 8 2 3 3 )

2 7 : ( / e t c / c r o n . d / a n a c r o n : 8 7 9 9 0 6 6 )

2 8 : ( / e t c / l o c a l t i m e : 8 7 9 8 3 7 1 )

6 4 6 : ( 5 3 5 3 : 1 : a n a c r o n )

3 0 : ( / p r o c / 6 5 5 9 / m o u n t s : 1 9 8 6 6 )

3 1 : ( / s b i n / m o u n t . n f s : 1 1 6 9 0 0 7 4 )

3 3 : ( u i d : 0 )

7 8 : ( / e x p o r t s : 1 7 2 . 1 8 . 3 4 . 5 )

7 9 ( / m n t / t r o j a n Ho r s e . t a r . g z )

8 0

8 1 : ( / e t c / m t a b ~ 6 5 6 0 : 8 7 9 8 3 1 6 )

8 2 : ( / e t c / m t a b ~ : 8 7 9 8 3 1 6 )

3 5 : ( / e t c / m o d p r o b e . d : 8 7 9 8 2 8 1 )

3 6 : ( / e t c / m o d p r o b e . d / n v i d i a - k e r n e l - n k c : 8 7 9 9 5 5 1 )

3 7 : ( / e t c / m o d p r o b e . d / b l a c k l i s t - wa t c h d o g : 8 7 9 9 5 4 5 )

3 8 : ( / e t c / m o d p r o b e . d / i s a p n p : 8 7 9 9 5 4 7 )

3 9 : ( / e t c / m o d p r o b e . d / o p t i o n s : 8 7 9 9 5 5 2 )

4 0 : ( / e t c / m o d p r o b e . d / b l a c k l i s t - f r a m e b u f f e r : 8 7 9 9 5 4 2 )

4 1 : ( / e t c / m o d p r o b e . d / a r c h / i 3 8 6 : 8 7 9 9 5 5 4 )

4 2 : ( / e t c / m o d p r o b e . d / a l i a s e s : 8 7 9 9 5 3 8 )

4 3 : ( / e t c / m o d p r o b e . d / t o s h i b a _ a c p i . m o d p r o b e : 8 7 9 9 5 5 3 )

4 4 : ( / e t c / m o d p r o b e . d / b l a c k l i s t : 8 7 9 9 5 4 1 )

4 5 : ( / e t c / m o d p r o b e . d / l r m - v i d e o : 8 7 9 9 5 5 0 )

4 6 : ( / e t c / m o d p r o b e . d / f u s e : 8 7 9 9 5 4 6 )

4 7 : ( / e t c / m o d p r o b e . d / a l s a - b a s e : 8 7 9 9 5 3 9 )

4 8 : ( / e t c / m o d p r o b e . d / b l a c k l i s t - m o d e m : 8 7 9 9 5 4 3 )

4 9 : ( / p r o c / m o d u l e s : 4 0 2 6 5 3 1 8 6 1 )

5 0 : ( 2 7 7 4 : 1 : u d e v d )

5 1 : ( / d e v / . u d e v / u e v e n t _ s e q n u m : 1 1 7 8 )

5 3 : ( / d e v / . u d e v / q u e u e : 1 9 8 6 7 )

5 5 : ( / d e v / . u d e v / q u e u e / 2 8 4 1 : 1 9 8 6 8 )

5 7 : ( 6 5 6 3 : 2 7 7 4 : u d e v d )

5 8 : ( / d e v / . u d e v / q u e u e / 2 8 4 2 : 1 9 8 7 1 )

5 9 : ( 6 5 6 6 : 2 7 7 4 : u d e v d )

6 0 : ( / d e v / . u d e v / q u e u e / 2 8 4 3 : 1 9 8 7 5 )

6 1 : ( 6 5 6 8 : 2 7 7 4 : u d e v d )

6 2 : ( / d e v / . u d e v / q u e u e / 2 8 4 4 : 1 9 8 7 9 )

6 3 : ( 6 5 7 0 : 2 7 7 4 : u d e v d )

6 4 : ( / d e v / . u d e v / q u e u e / 2 8 4 5 : 1 9 8 8 3 )

6 5 : ( 6 5 7 2 : 2 7 7 4 : u d e v d )

6 6 : ( / d e v / . u d e v / q u e u e / 2 8 4 6 : 1 9 8 8 7 )

6 7 : ( 6 5 7 3 : 2 7 7 4 : u d e v d )

6 8 : ( / d e v / . u d e v / q u e u e / 2 8 4 7 : 1 9 8 9 0 )

6 9 : ( 6 5 7 4 : 2 7 7 4 : u d e v d )

2 6 2 : ( / d e v / . u d e v / q u e u e / 2 8 4 8 : 2 0 0 5 3 )

2 6 3 : ( 6 6 4 1 : 2 7 7 4 : u d e v d )

2 8 7 : ( / d e v / . u d e v / q u e u e / 2 8 4 9 : 2 0 1 1 2 )

2 8 8 : ( 6 6 5 1 : 2 7 7 4 : u d e v d )

2 9 0 : ( / d e v / . u d e v / q u e u e / 2 8 5 0 : 2 0 1 1 6 )

2 9 1 : ( 6 6 5 3 : 2 7 7 4 : u d e v d )

2 9 4 : ( / d e v / . u d e v / q u e u e / 2 8 5 1 : 2 0 1 2 4 )

2 9 5 : ( 6 6 5 5 : 2 7 7 4 : u d e v d )

3 0 2 : ( / d e v / . u d e v / q u e u e / 2 8 5 2 : 2 0 1 6 2 )

3 0 3 : ( 6 6 5 8 : 2 7 7 4 : u d e v d )

5 1 6 : ( / d e v / . u d e v / q u e u e / 2 8 5 3 : 2 0 8 1 9 )

5 1 7 : ( 6 6 9 8 : 2 7 7 4 : u d e v d )

5 2 5 : ( / d e v / . u d e v / q u e u e / 2 8 5 4 : 2 0 8 4 4 )

5 2 6 : ( 6 7 0 1 : 2 7 7 4 : u d e v d )

5 3 0 : ( / d e v / . u d e v / q u e u e / 2 8 5 5 : 2 0 8 5 9 )

5 3 1 : ( 6 7 0 2 : 2 7 7 4 : u d e v d )

5 3 8 : ( / d e v / . u d e v / q u e u e / 2 8 5 6 : 2 0 8 8 4 )

5 3 9 : ( 6 7 0 5 : 2 7 7 4 : u d e v d )

5 4 6 : ( / d e v / . u d e v / q u e u e / 2 8 5 7 : 2 0 9 0 7 )

5 4 7 : ( 6 7 0 8 : 2 7 7 4 : u d e v d )

5 2 : ( / d e v / . u d e v : 1 1 7 6 )

5 4 : ( / : 2 )

5 6 : ( / p r o c / s t a t : 4 0 2 6 5 3 1 8 5 3 )

6 6 3

9 5 : ( 5 9 0 8 : 5 8 9 7 : a p t )

1 0 5 : ( 6 5 8 6 : 5 9 0 8 : a p t )

1 0 6 : ( 6 5 8 7 : 5 9 0 8 : a p t )

1 0 7 : ( 6 5 8 8 : 5 9 0 8 : a p t )

1 0 8 : ( 6 5 8 9 : 5 9 0 8 : a p t )

1 0 9 : ( 6 5 9 0 : 5 9 0 8 : a p t )

1 1 0 : ( 6 5 9 1 : 5 9 0 8 : a p t )

9 7 : ( / b i n / wh i c h : 9 6 6 7 7 6 )

9 8 : ( / u s r / b i n / d b u s - s e n d : 9 4 6 1 9 2 7 )

1 0 0 : ( 4 8 6 9 : 1 : d b u s - d a e m o n )

1 0 1 : ( / e t c / p a s s wd : 8 8 0 0 3 2 5 )

1 9 9 : ( 5 0 1 7 : 1 : c u p s d )

1 0 2 : ( / e t c / g r o u p : 8 8 0 0 2 8 7 )

1 0 3 : ( / b i n / t o u c h : 9 6 6 7 6 7 )

1 1 1 : ( / u s r / b i n / f i n d : 9 4 6 2 0 3 6 )

1 1 3 : ( / u s r / b i n / x a r g s : 9 4 6 2 9 0 8 )

1 5 8 : ( 6 6 0 8 : 6 6 0 4 : i n v o k e - r c . d )1 6 6 : ( 6 6 1 2 : 6 6 0 4 : i n v o k e - r c . d )

1 7 1 : ( 6 6 1 6 : 6 6 0 4 : i n v o k e - r c . d )

1 1 7 : ( / b i n / d a t e : 9 6 6 6 8 1 )

1 1 9 : ( / b i n / l s : 9 6 6 7 1 2 )

5 6 6 : ( 6 7 2 0 : 6 7 1 9 : s t a n d a r d )

1 2 0 : ( / p r o c / 6 5 9 6 / m o u n t s : 1 9 9 3 2 )

1 2 2 : ( / u s r / b i n / d u : 9 4 6 1 9 7 8 )

1 2 3 : ( / e t c / c r o n . d a i l y / a p t : 8 7 9 9 0 7 0 )

1 2 4 : ( 5 8 9 7 : 5 8 9 6 : r u n - p a r t s )

5 7 2 : ( 6 7 2 4 : 5 8 9 7 : r u n - p a r t s )

1 2 5 : ( / e t c / c r o n . d a i l y / a p t i t u d e : 8 7 9 9 0 7 1 )

1 2 7 : ( / e t c / c r o n . d a i l y / b s d m a i n u t i l s : 8 7 9 9 0 7 2 )

1 2 9 : ( / e t c / c r o n . d a i l y / l o g r o t a t e : 8 7 9 9 0 7 3 )

1 3 1 : ( / u s r / s b i n / l o g r o t a t e : 9 4 6 4 0 6 5 )

1 3 3 : ( / p r o c / 6 6 0 1 / m o u n t s : 1 9 9 4 1 )

1 3 4 : ( / e t c / l o g r o t a t e . c o n f : 8 7 9 8 3 7 3 )

1 3 5 : ( / e t c / l o g r o t a t e . d : 8 7 9 8 2 7 8 )

1 3 6 : ( / e t c / l o g r o t a t e . d / a c p i d : 8 7 9 9 5 2 5 )

1 3 7 : ( / e t c / l o g r o t a t e . d / a p p o r t : 8 7 9 9 5 2 6 )

1 3 8 : ( / e t c / l o g r o t a t e . d / a p t : 8 7 9 9 5 2 7 )

1 3 9 : ( / e t c / l o g r o t a t e . d / a p t i t u d e : 8 7 9 9 5 2 8 )

1 4 0 : ( / e t c / l o g r o t a t e . d / c u p s y s : 8 7 9 9 5 2 9 )

1 4 1 : ( / e t c / n s s wi t c h . c o n f : 8 7 9 8 3 9 3 )

1 4 2 : ( / e t c / l o g r o t a t e . d / p p p : 8 7 9 9 5 3 1 )

1 4 3 : ( / e t c / l o g r o t a t e . d / s c r o l l k e e p e r : 8 7 9 9 5 3 2 )

1 4 4 : ( / e t c / l o g r o t a t e . d / u n a t t e n d e d - u p g r a d e s : 8 7 9 9 5 3 3 )

1 4 5 : ( / e t c / l o g r o t a t e . d / wp a _ a c t i o n : 8 7 9 9 5 3 4 )

1 4 7 : ( / b i n / g z i p : 9 6 6 7 0 0 )

1 4 9 : ( / b i n / d a s h : 9 6 6 6 8 0 )

1 5 0 : ( / u s r / s b i n / i n v o k e - r c . d : 9 4 6 4 0 5 5 )

1 5 3 : ( 6 6 0 5 : 6 6 0 4 : i n v o k e - r c . d )

1 5 2 : ( / e t c / i n i t . d / c u p s y s : 8 7 9 9 4 2 0 )

1 5 5 : ( / s b i n / r u n l e v e l : 1 1 6 9 0 1 2 1 )

1 5 6 : ( / b i n / s e d : 9 6 6 7 5 1 )

1 6 0 : ( / e t c / r c 2 . d : 8 7 9 8 3 0 1 )

1 6 1 : ( / p r o c / 6 6 0 9 / m o u n t s : 1 9 9 5 3 )

1 6 2 : ( / e t c / r c 2 . d / S 2 0 c u p s y s : 8 7 9 9 7 0 7 )

1 6 5 : ( / b i n / e c h o : 9 6 6 6 8 8 )

1 6 8 : ( / p r o c / 6 6 1 3 / m o u n t s : 1 9 9 5 7 )

1 7 3 : ( / e t c / r c S . d : 8 7 9 8 3 0 6 )

1 7 4 : ( / p r o c / 6 6 1 7 / m o u n t s : 1 9 9 6 1 )

1 7 8 : ( / u s r / s b i n / c u p s d : 9 4 6 3 9 9 1 )

1 7 9 : ( / e t c / d e f a u l t / c u p s y s : 8 7 9 9 1 3 4 )

1 8 0 : ( / e t c / l s b - b a s e - l o g g i n g . s h : 8 7 9 8 3 7 4 )

1 8 1 : ( / e t c / t i m e z o n e : 8 7 9 8 4 1 6 )

1 8 3 : ( / b i n / c a t : 9 6 6 6 7 4 )

1 8 4 : ( / s b i n / u s p l a s h _ wr i t e : 1 1 6 9 0 1 5 0 )

1 8 6 : ( / u s r / b i n / t p u t : 9 4 6 2 8 0 9 )

1 8 7 : ( / u s r / b i n / e x p r : 9 4 6 2 0 1 7 )

1 8 9 : ( / e t c / t e r m i n f o : 8 7 9 8 3 1 8 )

1 9 6 : ( / s b i n / s t a r t - s t o p - d a e m o n : 1 1 6 9 0 1 2 8 )

1 9 8 : ( / p r o c / 5 0 1 7 / s t a t : 1 3 7 1 7 )

2 1 8 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 6 3 1 )

2 0 0 : ( / e t c / r e s o l v . c o n f : 8 7 9 9 6 6 5 )

2 0 1 : ( / e t c / h o s t s : 8 7 9 8 4 1 0 )

2 0 2 : ( / e t c / c u p s / c u p s d . c o n f : 8 7 9 9 0 9 2 )

2 0 3 : ( / e t c / c u p s : 8 7 9 8 2 3 8 )

2 0 4 : ( / e t c / c u p s / p p d : 8 7 9 9 0 8 8 )

2 0 5 : ( / e t c / c u p s / s s l : 8 7 9 9 0 8 9 )

2 0 6 : ( / e t c / c u p s / p r i n t e r s . c o n f : 8 7 9 9 0 9 7 )

2 0 8 : ( / e t c / c u p s / m i m e . c o n v s : 8 7 9 9 0 9 4 )

2 0 9 : ( / e t c / c u p s / c u p s - p d f . c o n f : 8 7 9 9 0 9 1 )

2 1 0 : ( / e t c / c u p s / c u p s d . c o n f . d e f a u l t : 8 7 9 9 0 9 3 )

2 1 1 : ( / e t c / c u p s / p d f t o p s . c o n f : 8 7 9 9 0 9 6 )

2 1 2 : ( / e t c / c u p s / m i m e . t y p e s : 8 7 9 9 0 9 5 )

2 1 3 : ( / e t c / c u p s / r a w. c o n v s : 8 7 9 9 0 9 8 )

2 1 4 : ( / e t c / c u p s / s n m p . c o n f : 8 7 9 9 1 0 0 )

2 1 5 : ( / e t c / c u p s / a c r o r e a d . c o n f : 8 7 9 9 0 9 0 )

2 1 6 : ( / e t c / c u p s / r a w. t y p e s : 8 7 9 9 0 9 9 )

2 1 7 : ( / e t c / c u p s / p p d / P DF . p p d : 8 7 9 9 1 0 1 )

2 2 0 : ( / b i n / s l e e p : 9 6 6 7 5 8 )

2 2 2 : ( / b i n / c h m o d : 9 6 6 6 7 6 )

2 2 4

2 2 5

2 6 1 : ( 6 6 4 0 : 6 6 3 6 : s s h d )

2 6 4 : ( 6 6 4 2 : 6 6 3 7 : s s h d )

2 6 5 : ( 6 6 4 3 : 6 6 3 5 : s s h d )

2 7 0 : ( 6 6 4 4 : 6 6 3 8 : s s h d )

2 7 1 : ( 6 6 4 5 : 6 6 3 9 : s s h d )

3 5 2 : ( 6 6 6 3 : 6 6 6 2 : s s h d )

3 5 3 : ( 6 6 6 4 : 6 6 5 9 : s s h d )

3 5 4 : ( 6 6 6 5 : 6 6 6 0 : s s h d )

3 5 5 : ( 6 6 6 6 : 6 6 6 1 : s s h d )

3 6 4 : ( 6 6 6 8 : 6 6 6 7 : s s h d )

4 0 2 : ( 6 6 7 3 : 6 6 7 0 : s s h d )

4 0 3 : ( 6 6 7 4 : 6 6 6 9 : s s h d )

4 0 4 : ( 6 6 7 5 : 6 6 7 1 : s s h d )

4 0 5 : ( 6 6 7 6 : 6 6 7 2 : s s h d )

4 1 6 : ( 6 6 7 8 : 6 6 7 7 : s s h d )

4 1 7 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 6 0 7 5 0 )

4 4 0 : ( 6 6 8 1 : 6 6 7 9 : s s h d )

4 4 5 : ( 6 6 8 3 : 6 6 8 0 : s s h d )

4 4 8 : ( 6 6 8 4 : 6 6 8 2 : s s h d )

4 5 5 : ( 6 6 8 6 : 6 6 8 5 : s s h d )

4 6 6 : ( 6 6 8 8 : 6 6 8 7 : s s h d )

4 8 4 : ( 6 6 9 1 : 6 6 9 0 : s s h d )

4 9 1 : ( 6 6 9 3 : 6 6 9 2 : s s h d )

4 9 8 : ( 6 6 9 5 : 6 6 9 4 : s s h d )

5 1 8

5 2 2 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 3 5 3 4 8 )

5 2 3 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 5 2 0 1 5 )

5 2 4

5 3 2

5 3 6 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 3 3 6 8 3 )

5 3 7

2 2 6 : ( 1 9 2 . 1 6 8 . 2 0 2 . 2 : 3 6 0 3 6 )

2 3 3 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 3 9 0 8 5 )

2 3 4 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 0 )

2 3 5 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 3 5 3 7 6 )

2 7 4 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 6 8 5 5 )

3 0 7 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 3 5 8 6 2 )

3 1 2 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 4 3 6 6 )

2 2 8 : ( / u s r / s b i n / s s h d : 9 4 6 2 6 6 8 ) 2 2 9 : ( / p r o c / 6 6 3 5 / m o u n t s : 1 9 9 8 1 )

2 3 0 : ( / p r o c / 6 6 3 5 / f d : 1 9 9 8 2 )

2 3 1 : ( / d e v / u r a n d o m : 1 7 7 7 )

2 3 2 : ( / e t c / g a i . c o n f : 8 7 9 8 3 5 0 )

2 3 6 : ( / e t c / s s h / s s h _ h o s t _ r s a _ k e y : 4 6 3 6 8 4 8 )

2 3 7 : ( / e t c / s s h / s s h _ h o s t _ d s a _ k e y : 4 6 3 6 8 4 6 )

2 3 8 : ( / e t c / p r o t o c o l s : 8 7 9 8 4 0 2 )

2 3 9 : ( 1 9 2 . 1 6 8 . 2 0 2 . 2 : 3 6 0 3 7 )

2 4 5 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 8 0 2 3 )

2 4 6 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 5 5 7 3 1 )

2 7 6 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 3 9 1 3 2 )

3 0 8 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 3 8 0 2 1 )

3 1 6 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 5 8 6 1 )

2 4 1 : ( / p r o c / 6 6 3 6 / m o u n t s : 1 9 9 9 8 )

2 4 2 : ( / p r o c / 6 6 3 6 / f d : 1 9 9 9 9 )

2 4 3 : ( 1 9 2 . 1 6 8 . 2 0 2 . 2 : 3 6 0 3 8 )

2 5 1 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 5 9 8 8 6 )

2 5 2 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 6 0 6 8 6 ) 2 7 7 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 7 6 5 5 )

3 1 0 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 3 8 3 7 )

3 1 3 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 3 6 3 3 6 )

2 4 7 : ( / p r o c / 6 6 3 7 / m o u n t s : 2 0 0 1 5 )

2 4 8 : ( / p r o c / 6 6 3 7 / f d : 2 0 0 1 6 )

2 4 9 : ( 1 9 2 . 1 6 8 . 2 0 2 . 2 : 3 6 0 3 9 )

2 5 7 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 5 2 2 9 8 )

2 5 8 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 9 9 8 8 )

2 7 5 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 7 0 0 4 )

3 0 9 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 5 6 4 3 9 )

3 1 5 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 3 8 4 8 5 )

2 5 3 : ( / p r o c / 6 6 3 8 / m o u n t s : 2 0 0 3 2 )

2 5 4 : ( / p r o c / 6 6 3 8 / f d : 2 0 0 3 3 )

2 5 5 : ( 1 9 2 . 1 6 8 . 2 0 2 . 2 : 3 6 0 4 0 )

2 6 8 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 0 5 8 7 )

2 6 9 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 5 6 5 2 )

2 7 8 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 3 9 6 8 8 )

3 1 1 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 3 7 5 8 5 )

3 1 4 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 3 6 3 4 6 )

2 5 9 : ( / e t c / h o s t s . a l l o w: 8 7 9 8 3 6 0 )

2 6 0 : ( / e t c / h o s t s . d e n y : 8 7 9 8 3 6 1 )

2 6 6 : ( / p r o c / 6 6 3 9 / m o u n t s : 2 0 0 6 5 )

2 6 7 : ( / p r o c / 6 6 3 9 / f d : 2 0 0 6 6 )

2 7 2 : ( / e t c / s s h / m o d u l i : 4 6 3 6 8 4 3 )

2 7 3 : ( / e t c / h o s t . c o n f : 8 7 9 8 3 5 8 )

2 7 9 : ( / e t c / c r o n . d a i l y / m a n - d b : 8 7 9 9 0 7 4 )

2 8 1 : ( 6 6 4 7 : 6 6 4 6 : m a n - d b )

2 8 2 : ( / b i n / c h o wn : 9 6 6 6 7 7 )

2 8 5 : ( / p r o c / s y s / k e r n e l / n g r o u p s _ m a x : 1 2 6 3 5 )

2 9 2 : ( / u s r / b i n / m a n d b : 9 4 6 2 4 0 1 )

2 9 6 : ( / e t c / m a n p a t h . c o n f i g : 8 7 9 8 3 8 1 )

2 9 7 : ( / u s r / l o c a l / m a n : 9 4 6 3 9 4 5 )

2 9 8 : ( / e t c / c r o n . d a i l y / m l o c a t e : 8 7 9 9 0 7 5 )

3 0 0 : ( / u s r / b i n / i o n i c e : 9 4 6 2 8 6 0 )

3 1 7 : ( / b i n / b a s h : 9 6 6 6 6 1 )

3 1 8 : ( / e t c / p a m . d : 8 7 9 8 2 8 7 )

3 1 9 : ( / e t c / p a m . d / s s h d : 8 8 0 0 2 9 1 )

3 2 0 : ( / e t c / p a m . d / c o m m o n - a u t h : 8 7 9 9 5 9 2 )

3 2 1 : ( / e t c / p a m . d / c o m m o n - a c c o u n t : 8 7 9 9 5 9 1 )

3 2 2 : ( / e t c / p a m . d / c o m m o n - s e s s i o n : 8 7 9 9 5 9 4 )

3 2 3 : ( / e t c / p a m . d / c o m m o n - p a s s wo r d : 8 7 9 9 5 9 3 )

3 2 4 : ( / e t c / p a m . d / o t h e r : 8 7 9 9 6 0 1 )

3 2 5 : ( / h o m e / j u n / . s s h / a u t h o r i z e d _ k e y s : 4 6 3 6 7 7 9 )

3 2 6 : ( / h o m e : 4 6 3 6 6 7 3 ) 3 2 7 : ( / h o m e / j u n / . s s h : 4 6 3 6 7 0 4 )

3 2 8 : ( 1 9 2 . 1 6 8 . 2 0 2 . 2 : 3 6 0 4 1 )

3 3 2 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 4 1 5 7 )

3 3 3 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 2 0 7 3 )

3 6 3 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 9 4 7 1 )

3 6 9 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 6 5 9 7 )

3 7 4 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 5 5 1 0 )

3 3 0 : ( / p r o c / 6 6 5 9 / m o u n t s : 2 0 2 1 0 )

3 3 1 : ( / p r o c / 6 6 5 9 / f d : 2 0 2 1 1 )

3 3 4 : ( 1 9 2 . 1 6 8 . 2 0 2 . 2 : 3 6 0 4 2 )

3 4 0 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 0 4 8 9 )

3 4 1 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 7 2 3 1 )

3 6 6 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 3 9 4 0 9 )

3 7 1 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 0 6 9 3 )

3 7 6 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 3 4 7 6 4 )

3 3 6 : ( / p r o c / 6 6 6 0 / m o u n t s : 2 0 2 2 7 )

3 3 7 : ( / p r o c / 6 6 6 0 / f d : 2 0 2 2 8 )

3 3 8 : ( 1 9 2 . 1 6 8 . 2 0 2 . 2 : 3 6 0 4 3 )

3 4 6 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 5 0 3 5 3 )

3 4 7 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 8 4 3 2 )

3 6 5 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 7 7 9 5 )

3 7 0 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 3 7 4 8 2 )

3 7 5 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 3 5 0 0 8 )

3 4 2 : ( / p r o c / 6 6 6 1 / m o u n t s : 2 0 2 4 4 )

3 4 3 : ( / p r o c / 6 6 6 1 / f d : 2 0 2 4 5 )

3 4 4 : ( 1 9 2 . 1 6 8 . 2 0 2 . 2 : 3 6 0 4 4 )

3 5 0 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 0 1 4 6 )

3 5 1 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 0 6 9 2 )

3 6 2 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 5 0 9 4 4 )

3 6 8 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 5 2 7 0 8 )

3 7 3 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 0 8 7 5 )

3 4 8 : ( / p r o c / 6 6 6 2 / m o u n t s : 2 0 2 6 1 )

3 4 9 : ( / p r o c / 6 6 6 2 / f d : 2 0 2 6 2 )

3 5 6 : ( 1 9 2 . 1 6 8 . 2 0 2 . 2 : 3 6 0 4 5 )

3 6 0 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 3 5 2 8 2 )

3 6 1 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 7 0 4 3 )

3 6 7 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 3 7 8 6 4 )

3 7 2 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 5 4 8 0 9 )

3 7 7 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 8 2 2 5 )

3 5 8 : ( / p r o c / 6 6 6 7 / m o u n t s : 2 0 2 9 7 )

3 5 9 : ( / p r o c / 6 6 6 7 / f d : 2 0 2 9 8 )

3 7 8 : ( 1 9 2 . 1 6 8 . 2 0 2 . 2 : 3 6 0 4 6 )

3 8 2 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 3 6 2 0 2 )

3 8 3 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 5 5 4 9 )

4 0 7 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 5 0 3 0 7 )

4 1 9 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 5 9 8 2 9 )

4 2 4 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 3 9 1 3 9 )

3 8 0 : ( / p r o c / 6 6 6 9 / m o u n t s : 2 0 3 6 9 )

3 8 1 : ( / p r o c / 6 6 6 9 / f d : 2 0 3 7 0 )

3 8 4 : ( 1 9 2 . 1 6 8 . 2 0 2 . 2 : 3 6 0 4 7 )

3 9 0 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 5 0 8 0 9 )

3 9 1 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 5 6 3 2 )

4 0 6 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 6 0 8 6 9 )

4 1 8 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 2 8 5 8 )

4 2 3 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 5 0 1 6 0 )

3 8 6 : ( / p r o c / 6 6 7 0 / m o u n t s : 2 0 3 8 6 )

3 8 7 : ( / p r o c / 6 6 7 0 / f d : 2 0 3 8 7 )

3 8 8 : ( 1 9 2 . 1 6 8 . 2 0 2 . 2 : 3 6 0 4 8 )

3 9 6 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 3 3 3 5 0 )

3 9 7 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 6 0 0 0 6 )

4 0 8 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 9 1 1 3 )

4 2 0 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 5 1 8 9 4 )

4 2 5 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 7 3 3 9 )

3 9 2 : ( / p r o c / 6 6 7 1 / m o u n t s : 2 0 4 0 3 )

3 9 3 : ( / p r o c / 6 6 7 1 / f d : 2 0 4 0 4 )

3 9 4 : ( 1 9 2 . 1 6 8 . 2 0 2 . 2 : 3 6 0 4 9 )

4 0 0 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 3 9 5 7 8 )

4 0 1 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 5 1 8 9 )

4 0 9 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 9 8 1 6 )

4 2 1 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 3 4 8 5 1 )

4 2 6 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 7 6 7 2 )

3 9 8 : ( / p r o c / 6 6 7 2 / m o u n t s : 2 0 4 2 1 )

3 9 9 : ( / p r o c / 6 6 7 2 / f d : 2 0 4 2 2 )

4 1 0 : ( 1 9 2 . 1 6 8 . 2 0 2 . 2 : 3 6 0 5 0 )

4 1 4 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 6 0 3 4 6 )

4 1 5 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 5 4 4 4 6 )

4 2 2 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 7 4 9 4 )

4 2 7 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 3 5 4 5 6 )

4 1 2 : ( / p r o c / 6 6 7 7 / m o u n t s : 2 0 4 6 9 )

4 1 3 : ( / p r o c / 6 6 7 7 / f d : 2 0 4 7 0 )

4 2 8 : ( 1 9 2 . 1 6 8 . 2 0 2 . 2 : 3 6 0 5 1 )

4 3 2 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 3 9 7 0 4 )4 3 3 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 5 1 9 1 )

4 5 7 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 7 1 6 0 )

4 6 9 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 5 1 8 9 0 )

4 7 4 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 5 1 6 1 8 )

4 3 0 : ( / p r o c / 6 6 7 9 / m o u n t s : 2 0 5 2 9 )

4 3 1 : ( / p r o c / 6 6 7 9 / f d : 2 0 5 3 0 )

4 3 4 : ( 1 9 2 . 1 6 8 . 2 0 2 . 2 : 3 6 0 5 2 )

4 3 8 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 3 3 9 3 6 )

4 3 9 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 3 4 6 0 4 )

4 5 6 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 6 4 3 3 )

4 6 8 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 1 1 5 1 )

4 7 3 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 1 5 0 7 ) 4 3 6 : ( / p r o c / 6 6 8 0 / m o u n t s : 2 0 5 4 6 )

4 3 7 : ( / p r o c / 6 6 8 0 / f d : 2 0 5 4 7 )

4 4 1 : ( 1 9 2 . 1 6 8 . 2 0 2 . 2 : 3 6 0 5 3 )

4 4 6 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 6 0 2 6 2 )

4 4 7 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 0 7 8 4 )

4 5 8 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 3 9 6 0 7 )

4 7 0 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 6 0 7 7 1 )

4 7 5 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 3 4 8 2 2 )

4 4 3 : ( / p r o c / 6 6 8 2 / m o u n t s : 2 0 5 6 7 )

4 4 4 : ( / p r o c / 6 6 8 2 / f d : 2 0 5 6 8 )

4 4 9 : ( 1 9 2 . 1 6 8 . 2 0 2 . 2 : 3 6 0 5 4 )

4 5 3 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 1 9 2 1 )

4 5 4 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 5 4 7 8 8 )

4 5 9 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 3 5 9 1 2 )

4 7 1 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 3 4 4 9 3 )

4 7 6 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 5 3 8 5 4 )

4 5 1 : ( / p r o c / 6 6 8 5 / m o u n t s : 2 0 5 9 2 )

4 5 2 : ( / p r o c / 6 6 8 5 / f d : 2 0 5 9 3 )

4 6 0 : ( 1 9 2 . 1 6 8 . 2 0 2 . 2 : 3 6 0 5 5 )

4 6 4 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 5 2 5 5 6 )

4 6 5 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 5 4 4 9 3 )

4 6 7 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 5 5 4 2 9 )

4 7 2 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 5 1 0 8 2 )

4 7 7 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 2 8 6 1 )

4 6 2 : ( / p r o c / 6 6 8 7 / m o u n t s : 2 0 6 2 9 )

4 6 3 : ( / p r o c / 6 6 8 7 / f d : 2 0 6 3 0 )

4 7 8 : ( 1 9 2 . 1 6 8 . 2 0 2 . 2 : 3 6 0 5 6 )

4 8 2 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 5 1 2 1 2 )

4 8 3 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 3 7 6 8 4 ) 5 0 7 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 5 1 1 9 7 )

5 1 0 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 9 0 9 8 )

5 1 3 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 3 1 9 0 )

4 8 0 : ( / p r o c / 6 6 9 0 / m o u n t s : 2 0 7 1 3 )

4 8 1 : ( / p r o c / 6 6 9 0 / f d : 2 0 7 1 4 )

4 8 5 : ( 1 9 2 . 1 6 8 . 2 0 2 . 2 : 3 6 0 5 7 )

4 8 9 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 5 6 3 0 6 )

4 9 0 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 5 9 9 0 2 )

5 0 9 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 5 3 2 7 1 )

5 1 2 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 3 7 2 9 7 )

5 1 5 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 3 0 1 1 )

4 8 7 : ( / p r o c / 6 6 9 2 / m o u n t s : 2 0 7 3 4 )

4 8 8 : ( / p r o c / 6 6 9 2 / f d : 2 0 7 3 5 )

4 9 2 : ( 1 9 2 . 1 6 8 . 2 0 2 . 2 : 3 6 0 5 8 )

4 9 6 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 2 2 4 6 )

4 9 7 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 5 7 3 9 4 )

5 0 8 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 5 3 7 4 7 )

5 1 1 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 5 6 7 4 )

5 1 4 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 3 2 9 1 )

4 9 4 : ( / p r o c / 6 6 9 4 / m o u n t s : 2 0 7 5 5 )

4 9 5 : ( / p r o c / 6 6 9 4 / f d : 2 0 7 5 6 )

4 9 9 : ( / e t c / s h a d o w: 8 8 0 0 2 9 7 )

5 0 1 : ( / e t c / s e c u r i t y / l i m i t s . c o n f : 8 7 9 9 9 5 2 )

5 0 2 : ( / e t c / s e c u r i t y / p a m _ e n v . c o n f : 8 7 9 9 9 5 6 )

5 0 3 : ( / e t c / e n v i r o n m e n t : 8 7 9 8 3 4 7 )

5 0 4 : ( / e t c / d e f a u l t / l o c a l e : 8 8 0 0 2 8 3 )

5 0 6 : ( / p r o c / m e m i n f o : 4 0 2 6 5 3 1 8 4 2 )

5 2 7 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 5 0 6 5 0 )

5 2 8 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 1 1 5 2 )

5 2 9 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 5 7 9 3 5 ) 5 2 0 : ( / p r o c / 6 6 9 9 / m o u n t s : 2 0 8 2 7 )

5 2 1 : ( / p r o c / 6 6 9 9 / f d : 2 0 8 2 8 )

5 4 0 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 5 0 1 8 1 )

5 4 1 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 5 4 2 6 1 )

5 4 2 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 4 5 3 6 7 )

5 3 4 : ( / p r o c / 6 7 0 3 / m o u n t s : 2 0 8 6 7 )

5 3 5 : ( / p r o c / 6 7 0 3 / f d : 2 0 8 6 8 )

5 4 5 : ( / u s r / b i n / s c p : 9 4 6 3 8 6 1 )

5 4 8 : ( / e t c / c r o n . d a i l y / s t a n d a r d : 8 7 9 9 0 7 6 )

5 6 3 : ( 6 7 1 8 : 6 7 0 9 : s t a n d a r d )

5 6 4 : ( 6 7 1 9 : 6 7 0 9 : s t a n d a r d )

5 5 0 : ( / u s r / b i n / c m p : 9 4 6 1 8 9 4 )

5 5 4 : ( / e t c / g s h a d o w: 8 8 0 0 2 8 6 )

5 5 7 : ( / b i n / d f : 9 6 6 6 8 4 )

5 5 9 : ( / u s r / b i n / a wk : 9 4 6 1 8 2 5 )

5 6 1 : ( / u s r / b i n / m a wk : 9 4 6 2 4 0 4 )

5 6 5 : ( / l o s t + f o u n d : 1 1 )

5 6 8 : ( / p r o c / 6 7 2 1 / m o u n t s : 2 0 9 2 4 )

5 6 9 : ( / b i n / g r e p : 9 6 6 6 9 7 )

5 7 5 : ( / u s r / b i n / s a v e l o g : 9 4 6 2 6 6 3 )

5 7 8 : ( / u s r / b i n / b a s e n a m e : 9 4 6 1 8 2 8 )

5 8 1 : ( / u s r / b i n / d i r n a m e : 9 4 6 1 9 6 6 )

5 8 3 : ( / b i n / r m : 9 6 6 7 4 6 )

5 8 5 : ( / b i n / m v : 9 6 6 7 2 4 )

5 8 7 : ( / p r o c / 6 7 3 6 / m o u n t s : 2 0 9 7 1 )

5 8 9 : ( / p r o c / 6 7 3 7 / m o u n t s : 2 0 9 7 3 )

5 9 1 : ( / p r o c / 6 7 3 8 / m o u n t s : 2 0 9 7 5 )5 9 3 : ( / p r o c / 6 7 3 9 / m o u n t s : 2 0 9 7 7 )

5 9 5 : ( / p r o c / 6 7 4 0 / m o u n t s : 2 0 9 7 9 )

5 9 8 : ( / p r o c / 6 7 4 2 / m o u n t s : 2 0 9 8 2 )

6 0 0 : ( / b i n / c h g r p : 9 6 6 6 7 5 )

6 0 7 : ( / b i n / l n : 9 6 6 7 0 8 )

6 1 0 : ( / p r o c / 6 7 5 1 / m o u n t s : 2 0 9 9 3 )

6 1 8 : ( / p r o c / 4 7 8 8 / c m d l i n e : 1 2 8 6 3 )

6 4 3 : ( / p r o c / 4 7 8 8 / s t a t : 1 2 8 6 2 )

6 4 7 : ( / t m p / f i l e P o W e i u : ( d e l e t e d ) )

6 6 1

6 6 2 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 7 0 9 )

6 6 4 : ( / e x p o r t s : 9 4 5 3 5 6 9 )

6 7 0 : ( 1 7 2 . 1 8 . 3 4 . 1 0 : 5 2 2 )

6 7 2

6 7 1 : ( 1 7 2 . 1 8 . 3 4 . 1 0 : 5 9 6 )

7 4 3

6 6 5 : ( 1 9 2 . 1 6 8 . 1 0 1 . 5 : 8 3 4 )

6 7 3 : ( / e x p o r t s / . n f s 0 0 0 0 0 0 0 0 0 0 9 0 4 0 0 3 0 0 0 0 0 0 0 1 : 9 4 5 3 5 7 1 )

6 7 4 : ( / e x p o r t s / . n f s 0 0 0 0 0 0 0 0 0 0 9 0 4 0 2 4 0 0 0 0 0 0 0 1 : 9 4 5 3 6 0 4 )

6 7 5 : ( / e x p o r t s / . n f s 0 0 0 0 0 0 0 0 0 0 9 0 4 0 0 2 0 0 0 0 0 0 0 1 : 9 4 5 3 5 7 0 )

6 7 6 : ( / e x p o r t s / . n f s 0 0 0 0 0 0 0 0 0 0 9 0 4 0 0 4 0 0 0 0 0 0 0 1 : 9 4 5 3 5 7 2 )

6 7 7 : ( / e x p o r t s / . n f s 0 0 0 0 0 0 0 0 0 0 9 0 4 0 0 a 0 0 0 0 0 0 0 1 : 9 4 5 3 5 7 8 )

6 7 8 : ( / : 2 )

6 7 9 : ( / e x p o r t s / . n f s 0 0 0 0 0 0 0 0 0 0 9 0 4 0 0 7 0 0 0 0 0 0 0 1 : 9 4 5 3 5 7 5 )

6 8 0 : ( / e x p o r t s / . n f s 0 0 0 0 0 0 0 0 0 0 9 0 4 0 0 5 0 0 0 0 0 0 0 1 : 9 4 5 3 5 7 3 )6 8 1 : ( / e x p o r t s / . n f s 0 0 0 0 0 0 0 0 0 0 9 0 4 0 0 c 0 0 0 0 0 0 0 1 : 9 4 5 3 5 8 0 )

6 8 5 : ( 6 3 2 1 : 6 3 2 0 : b a s h ) 6 8 8 : ( 6 7 3 6 : 6 3 2 1 : b a s h )

6 8 6 : ( / h o m e / c a r t : 9 7 4 8 5 0 )

8 2 2 : ( 6 2 8 5 : 5 7 9 8 : b a s h )

8 2 3 : ( 6 7 6 5 : 6 2 8 5 : b a s h )

1 2 2 5

1 2 6 9 : ( 6 8 3 2 : 6 8 1 5 : b a s h )

6 8 7 : ( / b i n / m o u n t : 5 3 2 5 4 4 )

6 9 4 : ( 6 7 3 7 : 6 7 3 6 : m o u n t )

6 8 9 : ( / e t c / l d . s o . c a c h e : 2 8 3 6 6 5 9 )

6 9 7 : ( 6 7 3 9 : 6 7 3 8 : m o d p r o b e )

7 7 0 : ( 6 7 6 0 : 6 7 1 9 : b a s h )

7 7 5 : ( 6 7 6 1 : 6 7 1 9 : b a s h )

7 7 9 : ( 6 7 6 2 : 6 7 1 9 : b a s h )

7 8 3 : ( 6 7 6 3 : 6 7 1 9 : b a s h )

7 8 4 : ( 6 7 6 4 : 6 7 6 3 : t a r )

8 5 1 : ( 6 7 7 5 : 6 2 8 5 : b a s h )

8 5 6 : ( 6 7 7 9 : 6 2 8 5 : b a s h )

8 5 9 : ( 6 7 8 1 : 6 2 8 5 : b a s h )

8 6 3 : ( 6 7 8 3 : 6 7 8 1 : e x p l o i t . s h )

8 6 7 : ( 6 7 8 6 : 6 7 8 4 : wu n d e r b a r _ e m p o r )

8 6 9 : ( 6 7 8 7 : 6 7 8 3 : wu n d e r b a r _ e m p o r )

8 7 1 : ( 6 7 8 8 : 6 7 8 3 : wu n d e r b a r _ e m p o r )

8 7 4 : ( 6 7 8 9 : 6 7 8 3 : wu n d e r b a r _ e m p o r )

8 7 7 : ( 6 7 9 0 : 6 7 8 3 : wu n d e r b a r _ e m p o r )

1 0 2 0 : ( 6 7 9 1 : 6 7 8 3 : wu n d e r b a r _ e m p o r )

1 0 2 2 : ( 6 7 9 2 : 6 7 8 3 : wu n d e r b a r _ e m p o r )

1 0 2 6 : ( 6 7 9 3 : 6 7 8 3 : wu n d e r b a r _ e m p o r )

1 0 3 5 : ( 6 7 9 4 : 6 7 9 3 : c c 1 )

1 0 9 9 : ( 6 7 9 5 : 6 7 9 3 : c c )

1 1 0 1 : ( 6 7 9 6 : 6 7 9 3 : c o l l e c t 2 )

1 1 0 9 : ( 6 7 9 7 : 6 7 9 6 : c o l l e c t 2 )

1 1 1 0 : ( 6 7 9 8 : 6 7 8 3 : wu n d e r b a r _ e m p o r )

1 1 1 2 : ( 6 7 9 9 : 6 7 9 8 : c c 1 )

1 1 1 6 : ( 6 8 0 0 : 6 7 9 8 : c c )

1 1 1 7 : ( 6 8 0 1 : 6 7 9 8 : c o l l e c t 2 )

1 1 2 2 : ( 6 8 0 2 : 6 8 0 1 : c o l l e c t 2 )

1 1 2 3 : ( 6 8 0 3 : 6 7 8 3 : wu n d e r b a r _ e m p o r )

1 1 2 4 : ( 6 8 0 5 : 6 8 0 4 : m o d p r o b e )

1 1 5 5 : ( 6 8 0 8 : 6 8 0 7 : m o d p r o b e )

1 1 5 9 : ( 6 8 1 1 : 6 8 0 3 : s h )

1 1 8 3 : ( 6 8 1 2 : 6 7 8 3 : wu n d e r b a r _ e m p o r )

1 1 9 1

1 2 3 0 : ( 6 8 1 6 : 5 2 6 5 : h a l d - r u n n e r )

1 2 3 3 : ( 6 8 1 7 : 6 8 1 6 : h a l - a c l - t o o l )

1 2 3 9 : ( 6 8 1 9 : 6 8 1 8 : b a s h )

1 2 4 2 : ( 6 8 2 0 : 6 8 1 6 : h a l - a c l - t o o l )

1 2 4 6 : ( 6 8 2 1 : 5 2 6 5 : h a l d - r u n n e r )

1 2 4 8 : ( 6 8 2 2 : 6 8 2 1 : h a l - a c l - t o o l )

1 2 5 0 : ( 6 8 2 3 : 6 8 2 1 : h a l - a c l - t o o l )

1 2 5 2 : ( 6 8 2 4 : 5 2 6 5 : h a l d - r u n n e r )

1 2 5 4 : ( 6 8 2 5 : 6 8 2 4 : h a l - a c l - t o o l )1 2 5 6 : ( 6 8 2 6 : 6 8 2 4 : h a l - a c l - t o o l )

1 2 5 8 : ( 6 8 2 7 : 6 8 1 5 : b a s h )

1 2 6 0 : ( 6 8 2 8 : 6 8 1 5 : b a s h )

1 2 6 1 : ( 6 8 2 9 : 6 8 1 5 : b a s h )

1 2 6 4 : ( 6 8 3 0 : 6 8 1 5 : b a s h )

1 2 6 8 : ( 6 8 3 1 : 6 8 1 5 : b a s h )

1 2 7 1 : ( 6 8 3 3 : 6 8 1 5 : b a s h )

1 2 7 4 : ( 6 8 3 4 : 6 8 1 5 : b a s h )

1 2 7 5 : ( 6 8 3 5 : 6 8 1 5 : b a s h )

1 2 7 7 : ( 6 8 3 6 : 6 8 1 5 : b a s h )

1 2 8 5 : ( 6 8 3 7 : 6 8 1 5 : b a s h )

6 9 0 : ( / p r o c / 6 7 3 6 / m o u n t s : 2 0 1 2 6 )

6 9 1 : ( / e t c / l o c a l e . a l i a s : 1 4 9 1 1 0 6 )

6 9 2 : ( / e t c / m t a b : 1 4 9 3 0 8 8 )

6 9 3 : ( / s b i n / m o u n t . n f s : 3 3 9 9 7 1 9 )

6 9 5 : ( u i d : 0 )

6 9 6

7 4 1 : ( / e x p o r t s : 1 7 2 . 1 8 . 3 4 . 5 )

7 4 2 : ( / m n t / t r o j a n Ho r s e . t a r . g z : )

7 4 7 : ( / e t c / m t a b ~ 6 7 3 7 : 1 4 9 3 0 8 2 )

7 4 8 : ( / e t c / m t a b ~ : 1 4 9 3 0 8 2 )

7 6 9 : ( 6 7 1 9 : 6 7 1 8 : b a s h )

6 9 8 : ( / e t c / m o d p r o b e . d : 1 4 9 1 0 1 7 )

6 9 9 : ( / e t c / m o d p r o b e . d / a l s a - b a s e : 1 4 9 2 2 8 0 )

7 0 0 : ( / e t c / m o d p r o b e . d / t o s h i b a _ a c p i . m o d p r o b e : 1 4 9 2 2 9 4 )

7 0 1 : ( / e t c / m o d p r o b e . d / o p t i o n s : 1 4 9 2 2 9 3 )

7 0 2 : ( / e t c / m o d p r o b e . d / n v i d i a - k e r n e l - n k c : 1 4 9 2 2 9 2 )

7 0 3 : ( / e t c / m o d p r o b e . d / a l i a s e s : 1 4 9 2 2 7 9 )

7 0 4 : ( / e t c / m o d p r o b e . d / l r m - v i d e o : 1 4 9 2 2 9 1 )

7 0 5 : ( / e t c / m o d p r o b e . d / i s a p n p : 1 4 9 2 2 8 8 )

7 0 6 : ( / e t c / m o d p r o b e . d / b l a c k l i s t - f r a m e b u f f e r : 1 4 9 2 2 8 3 )

7 0 7 : ( / e t c / m o d p r o b e . d / b l a c k l i s t - m o d e m : 1 4 9 2 2 8 4 )

7 0 8 : ( / e t c / m o d p r o b e . d / b l a c k l i s t : 1 4 9 2 2 8 2 )

7 0 9 : ( / e t c / m o d p r o b e . d / f u s e : 1 4 9 2 2 8 7 )

7 1 0 : ( / e t c / m o d p r o b e . d / a r c h / i 3 8 6 : 1 4 9 2 2 9 5 )

7 1 1 : ( / e t c / m o d p r o b e . d / b l a c k l i s t - wa t c h d o g : 1 4 9 2 2 8 6 )

7 1 2 : ( / p r o c / m o d u l e s : 4 0 2 6 5 3 1 8 6 1 )

7 1 3 : ( 2 8 1 6 : 1 : u d e v d )

7 1 4 : ( / d e v / . u d e v / u e v e n t _ s e q n u m : 1 1 9 7 )

7 1 6 : ( / d e v / . u d e v / q u e u e : 2 0 1 2 7 )

7 1 8 : ( / d e v / . u d e v / q u e u e / 2 7 9 1 : 2 0 1 2 8 )

7 2 0 : ( 6 7 4 0 : 2 8 1 6 : u d e v d )

7 2 1 : ( / d e v / . u d e v / q u e u e / 2 7 9 2 : 2 0 1 3 2 )

7 2 2 : ( 6 7 4 3 : 2 8 1 6 : u d e v d )

7 2 3 : ( / d e v / . u d e v / q u e u e / 2 7 9 3 : 2 0 1 3 6 )

7 2 4 : ( 6 7 4 5 : 2 8 1 6 : u d e v d )

7 2 5 : ( / d e v / . u d e v / q u e u e / 2 7 9 4 : 2 0 1 4 0 )

7 2 6 : ( 6 7 4 7 : 2 8 1 6 : u d e v d )

7 2 7 : ( / d e v / . u d e v / q u e u e / 2 7 9 5 : 2 0 1 4 4 )

7 2 8 : ( 6 7 4 9 : 2 8 1 6 : u d e v d )

7 2 9 : ( / d e v / . u d e v / q u e u e / 2 7 9 6 : 2 0 1 4 8 )

7 3 0 : ( 6 7 5 0 : 2 8 1 6 : u d e v d )

7 3 1 : ( / d e v / . u d e v / q u e u e / 2 7 9 7 : 2 0 1 5 1 )

7 3 2 : ( 6 7 5 1 : 2 8 1 6 : u d e v d )

1 1 5 6 : ( / d e v / . u d e v / q u e u e / 2 7 9 8 : 2 0 3 7 2 )

1 1 5 7 : ( 6 8 0 9 : 2 8 1 6 : u d e v d )

7 1 5 : ( / d e v / . u d e v : 1 1 9 5 )

7 1 7 : ( / : 2 )

8 4 1 : ( 6 7 6 7 : 6 2 8 5 : b a s h )

1 2 3 6 : ( 6 8 1 8 : 6 8 1 5 : b a s h )

7 1 9 : ( / p r o c / s t a t : 4 0 2 6 5 3 1 8 5 3 )

7 4 4 : ( 5 2 0 0 : 1 : h a l d )

7 4 5 : ( / p r o c / 5 2 0 0 / m o u n t s : 1 2 8 2 4 )

7 4 6 : ( / d e v / d i s k / b y - u u i d / e 3 2 6 2 c d f - 6 f 1 a - 4 5 a 5 - 9 7 b 9 - 0 6 6 8 1 e 8 1 b e 5 0 : 5 9 2 1 )

7 4 9 : ( 5 7 4 8 : 1 : f a s t - u s e r - s wi t c )

7 5 0 : ( i n o t i f y : 1 )

7 5 1 : ( 5 6 5 3 : 5 5 6 7 : n a u t i l u s )

7 5 2 : ( / p r o c / 5 6 5 3 / m o u n t s : 1 6 0 3 8 )

7 5 3 : ( / e t c / f s t a b : 1 4 9 0 9 4 6 )

7 5 4 : ( / d e v : 5 5 3 )

7 5 5 : ( / d e v / s c d 0 : 5 7 9 0 )

7 5 6 : ( / d e v / f d 0 : 5 5 7 9 )

7 6 0 : ( 5 4 6 1 : 1 : c r o n )

7 6 1 : ( / e t c / c r o n t a b : 1 4 9 1 0 7 8 )

7 6 2 : ( / e t c / c r o n . d : 1 4 9 0 9 6 9 )

7 6 3 : ( / e t c / c r o n . d / a n a c r o n : 1 4 9 1 8 0 7 )

7 6 4 : ( / e t c / l o c a l t i m e : 1 4 9 1 1 0 7 )

8 5 8 : ( 6 7 8 0 : 6 7 1 9 : b a s h )

7 7 1 : ( / b i n / l s : 5 3 2 5 3 6 )

7 7 2 : ( / p r o c / 6 7 6 0 / m o u n t s : 2 0 1 8 2 )

7 7 3 : ( / h o m e / u s e r / t e s t - b e d : 1 3 8 4 6 0 9 )

8 4 9 : ( 6 7 7 3 : 6 2 8 5 : b a s h )

8 5 4 : ( 6 7 7 7 : 6 2 8 5 : b a s h )

7 7 4 : ( / b i n / c p : 5 3 2 5 0 2 )

7 7 8

7 7 6 : ( / p r o c / 6 7 6 1 / m o u n t s : 2 0 1 8 5 )

7 7 7 : ( / p r o c / f i l e s y s t e m s : 4 0 2 6 5 3 1 8 4 4 )

7 8 0 : ( / p r o c / 6 7 6 2 / m o u n t s : 2 0 1 8 9 )

7 8 1 : ( / h o m e / u s e r / t e s t - b e d / t r o j a n Ho r s e _ b k . t a r . g z : 1 3 8 4 5 7 3 )

7 8 2 : ( / b i n / t a r : 5 3 2 5 8 9 )

7 9 0 : ( / h o m e / u s e r / t e s t - b e d / t r o j a n Ho r s e : 1 5 4 0 3 0 8 )

7 9 1 : ( / h o m e / u s e r / t e s t - b e d / t r o j a n Ho r s e / o l d _ l o g : 1 5 4 0 3 0 9 )

7 9 2 : ( / h o m e / u s e r / t e s t - b e d / t r o j a n Ho r s e / o l d _ l o g / t r a c e _ d j . o l d : 1 5 4 0 3 1 0 )

7 9 3 : ( / h o m e / u s e r / t e s t - b e d / t r o j a n Ho r s e / o l d _ l o g / t r a c e _ x i . o l d : 1 5 4 0 3 1 1 )

7 9 4 : ( / h o m e / u s e r / t e s t - b e d / t r o j a n Ho r s e / o l d _ l o g / t r a c e _ d j . 2 : 1 5 4 0 3 1 2 )

7 9 5 : ( / h o m e / u s e r / t e s t - b e d / t r o j a n Ho r s e / wu n d e r b a r _ e m p o r i u m - 3 . t g z : 1 5 4 0 3 1 3 )

7 9 6 : ( / h o m e / u s e r / t e s t - b e d / t r o j a n Ho r s e / wu n d e r b a r _ e m p o r i u m _ l o g : 1 5 4 0 3 1 4 )

7 9 7 : ( / h o m e / u s e r / t e s t - b e d / t r o j a n Ho r s e / t r a c e 1 : 1 5 4 0 3 1 5 )

7 9 8 : ( / h o m e / u s e r / t e s t - b e d / t r o j a n Ho r s e / 3 6 0 3 8 - 4 . t g z : 1 5 4 0 3 1 6 )

7 9 9 : ( / h o m e / u s e r / t e s t - b e d / t r o j a n Ho r s e / t r a c e 2 : 1 5 4 0 3 1 7 )

8 0 0 : ( / h o m e / u s e r / t e s t - b e d / t r o j a n Ho r s e / e x p l o i t . s h : 1 5 4 0 3 1 8 )

8 0 1 : ( / h o m e / u s e r / t e s t - b e d / t r o j a n Ho r s e / wu n d e r b a r _ e m p o r i u m : 1 5 4 8 3 7 2 )

8 0 2 : ( / h o m e / u s e r / t e s t - b e d / t r o j a n Ho r s e / wu n d e r b a r _ e m p o r i u m / o l d _ l o g : 1 5 4 8 3 7 3 )

8 0 3 : ( / h o m e / u s e r / t e s t - b e d / t r o j a n Ho r s e / wu n d e r b a r _ e m p o r i u m / o l d _ l o g / t r a c e _ x i . o l d : 1 5 4 8 3 7 4 )

8 0 4 : ( / h o m e / u s e r / t e s t - b e d / t r o j a n Ho r s e / wu n d e r b a r _ e m p o r i u m / o l d _ l o g / t r a c e _ d j . n e w: 1 5 4 8 3 7 5 )

8 0 5 : ( / h o m e / u s e r / t e s t - b e d / t r o j a n Ho r s e / wu n d e r b a r _ e m p o r i u m / e x p l o i t . c : 1 5 4 8 3 7 6 )

8 0 6 : ( / h o m e / u s e r / t e s t - b e d / t r o j a n Ho r s e / wu n d e r b a r _ e m p o r i u m / wu n d e r b a r _ e m p o r i u m . s h : 1 5 4 8 3 7 7 )

8 0 7 : ( / h o m e / u s e r / t e s t - b e d / t r o j a n Ho r s e / wu n d e r b a r _ e m p o r i u m / p wn k e r n e l . o : 1 5 4 8 3 7 8 )

8 0 8 : ( / h o m e / u s e r / t e s t - b e d / t r o j a n Ho r s e / wu n d e r b a r _ e m p o r i u m / e x p l o i t : 1 5 4 8 3 7 9 )

8 0 9 : ( / h o m e / u s e r / t e s t - b e d / t r o j a n Ho r s e / wu n d e r b a r _ e m p o r i u m / t z a m e t i . a v i : 1 5 4 8 3 8 0 )

8 1 0 : ( / h o m e / u s e r / t e s t - b e d / t r o j a n Ho r s e / wu n d e r b a r _ e m p o r i u m / p wn k e r n e l _ x i . o l d : 1 5 4 8 3 8 1 )

8 1 1 : ( / h o m e / u s e r / t e s t - b e d / t r o j a n Ho r s e / wu n d e r b a r _ e m p o r i u m / e x p l o i t . c ~ : 1 5 4 8 3 8 2 )

8 1 2 : ( / h o m e / u s e r / t e s t - b e d / t r o j a n Ho r s e / wu n d e r b a r _ e m p o r i u m / p wn k e r n e l . c : 1 5 4 8 3 8 3 )

8 1 3 : ( / h o m e / u s e r / t e s t - b e d / t r o j a n Ho r s e / wu n d e r b a r _ e m p o r i u m / e x p l o i t . s o : 1 5 4 8 3 8 5 )

8 1 4 : ( / h o m e / u s e r / t e s t - b e d / t r o j a n Ho r s e / wu n d e r b a r _ e m p o r i u m / p wn k e r n e l . o l d : 1 5 4 8 3 8 6 )

8 1 5 : ( / h o m e / u s e r / t e s t - b e d / t r o j a n Ho r s e / wu n d e r b a r _ e m p o r i u m / e x p l o i t . s o . o l d : 1 5 4 8 3 8 7 )

8 1 6 : ( / h o m e / u s e r / t e s t - b e d / t r o j a n Ho r s e / wu n d e r b a r _ e m p o r i u m / p wn k e r n e l . c ~ : 1 5 4 8 3 8 9 )

8 1 7 : ( / h o m e / u s e r / t e s t - b e d / t r o j a n Ho r s e / wu n d e r b a r _ e m p o r i u m / p wn k e r n e l : 1 5 4 8 3 9 0 )

8 1 8 : ( / h o m e / u s e r / t e s t - b e d / t r o j a n Ho r s e / 3 6 0 3 8 - 4 : 1 5 4 8 3 9 1 )

8 1 9 : ( / h o m e / u s e r / t e s t - b e d / t r o j a n Ho r s e / 3 6 0 3 8 - 4 / r u n . c : 1 5 4 8 3 9 2 )

8 2 0 : ( / h o m e / u s e r / t e s t - b e d / t r o j a n Ho r s e / 3 6 0 3 8 - 4 / e x p l o i t . c : 1 5 4 8 3 9 4 )

8 2 1 : ( / h o m e / u s e r / t e s t - b e d / t r o j a n Ho r s e / 3 6 0 3 8 - 4 / r u n . s h : 1 5 4 8 3 9 5 )

7 8 5 : ( ERROR: )

7 8 6 : ( / b i n / g z i p : 5 3 2 5 2 4 )

7 8 7 : ( / e t c / n s s wi t c h . c o n f : 1 4 9 1 1 2 9 )

7 8 8

1 1 3 6 : ( 4 9 2 0 : 1 : d b u s - d a e m o n )

7 8 9 : ( / e t c / g r o u p : 1 4 9 3 1 0 1 )

8 4 0 : ( 6 7 6 6 : 6 2 8 5 : b a s h )

8 4 4 : ( 6 7 6 9 : 6 2 8 5 : b a s h )

8 4 5 : ( 6 7 7 0 : 6 2 8 5 : b a s h )

8 4 8 : ( 6 7 7 2 : 6 2 8 5 : b a s h )

8 5 3 : ( 6 7 7 6 : 6 2 8 5 : b a s h )

8 2 4 : ( / p r o c / 6 7 6 5 / m o u n t s : 2 0 2 3 0 )

8 2 5 : ( / h o m e / c a r t / T e m p l a t e s : 9 7 4 8 6 5 )

8 2 6 : ( / h o m e / c a r t / t r o j a n Ho r s e . t a r . g z : 9 7 5 0 8 2 )

8 2 7 : ( / h o m e / c a r t / P i c t u r e s : 9 7 4 8 6 9 )

8 2 8 : ( / h o m e / c a r t / M u s i c : 9 7 4 8 6 8 )

8 2 9 : ( / h o m e / c a r t / Vi d e o s : 9 7 4 8 7 0 )

8 3 0 : ( / h o m e / c a r t / S c r e e n s h o t - 1 . p n g : 9 7 5 0 6 1 )

8 3 1 : ( / h o m e / c a r t / wo r k s t a t i o n _ s p _ b _ e . o v a : 9 7 5 0 3 2 )

8 3 2 : ( / h o m e / c a r t / Vi r t u a l Bo x : VM s )

8 3 3 : ( / h o m e / c a r t / e x p e r i m e n t a t i o n : 1 3 8 4 5 5 9 )

8 3 4 : ( / h o m e / c a r t / S c r e e n s h o t . p n g : 9 7 5 0 4 7 )

8 3 5 : ( / h o m e / c a r t / P u b l i c : 9 7 4 8 6 6 )

8 3 6 : ( / h o m e / c a r t / Do c u m e n t s : 9 7 4 8 6 7 )

8 3 7 : ( / h o m e / c a r t / De s k t o p : 9 7 4 8 6 3 )

8 3 8 : ( / h o m e / c a r t / t r o j a n Ho r s e : 1 3 8 4 6 2 6 )

8 3 9 : ( / h o m e / c a r t / Ex a m p l e s : 9 7 4 8 5 4 )

8 4 2 : ( 6 7 6 8 : 6 7 6 7 : b a s h )

8 4 3 : ( / h o m e : 9 7 4 8 4 9 )

8 4 6 : ( 6 7 7 1 : 6 7 7 0 : b a s h )

8 4 7 : ( / h o m e / u s e r : 1 3 8 4 6 0 8 )

8 5 0 : ( 6 7 7 4 : 6 7 7 3 : b a s h )

8 5 2 : ( / p r o c / 6 7 7 5 / m o u n t s : 2 0 2 5 1 )

8 5 5 : ( 6 7 7 8 : 6 7 7 7 : b a s h )

8 5 7 : ( / p r o c / 6 7 7 9 / m o u n t s : 2 0 2 5 9 )

8 6 2 : ( 6 7 8 2 : 6 7 8 1 : e x p l o i t . s h )

8 6 0 : ( / d e v / t t y : 3 5 3 4 )

8 6 1 : ( / p r o c / m e m i n f o : 4 0 2 6 5 3 1 8 4 2 )

8 6 4 : ( 6 7 8 4 : 6 7 8 3 : wu n d e r b a r _ e m p o r )

8 6 8 : ( / h o m e / u s e r / t e s t - b e d / t r o j a n Ho r s e / wu n d e r b a r _ e m p o r i u m / p wn k e r n e l 1 . c : 1 5 4 8 3 9 6 )

8 6 5 : ( 6 7 8 5 : 6 7 8 4 : wu n d e r b a r _ e m p o r )

8 6 6 : ( / b i n / s e d : 5 3 2 5 7 5 )

8 7 0 : ( / b i n / m v : 5 3 2 5 4 8 )

8 7 3 : ( / h o m e / u s e r / t e s t - b e d / t r o j a n Ho r s e / wu n d e r b a r _ e m p o r i u m / p wn k e r n e l 2 . c : 1 5 4 8 3 8 3 )

8 7 2 : ( / p r o c / 6 7 8 8 / m o u n t s : 2 0 2 8 6 )

8 7 5 : ( / p r o c / 6 7 8 9 / m o u n t s : 2 0 2 8 8 )

8 7 6 : ( / u s r / b i n / k i l l a l l : 2 7 5 3 0 8 7 )

9 6 2

8 7 8 : ( / p r o c / 6 7 9 0 / s t a t : 2 0 2 9 0 )

8 7 9 : ( / p r o c : 1 )

8 8 0 : ( / p r o c / 1 / s t a t : 1 5 2 3 )

8 8 1 : ( / p r o c / 2 / s t a t : 1 5 2 4 )

8 8 2 : ( / p r o c / 3 / s t a t : 1 5 2 5 )

8 8 3 : ( / p r o c / 4 / s t a t : 1 5 2 6 )

8 8 4 : ( / p r o c / 5 / s t a t : 1 5 2 7 )

8 8 5 : ( / p r o c / 6 / s t a t : 1 5 2 8 )

8 8 6 : ( / p r o c / 7 / s t a t : 1 5 2 9 )

8 8 7 : ( / p r o c / 4 0 / s t a t : 1 5 3 0 )

8 8 8 : ( / p r o c / 4 3 / s t a t : 1 5 3 1 )

8 8 9 : ( / p r o c / 4 4 / s t a t : 1 5 3 2 )

8 9 0 : ( / p r o c / 1 7 0 / s t a t : 1 5 3 3 )

8 9 1 : ( / p r o c / 2 0 9 / s t a t : 1 5 3 4 )

8 9 2 : ( / p r o c / 2 1 0 / s t a t : 1 5 3 5 )

8 9 3 : ( / p r o c / 2 1 1 / s t a t : 1 5 3 6 )

8 9 4 : ( / p r o c / 2 5 2 / s t a t : 1 5 3 7 )

8 9 5 : ( / p r o c / 1 6 0 8 / s t a t : 6 1 6 6 )

8 9 6 : ( / p r o c / 1 6 1 1 / s t a t : 6 1 6 7 )

8 9 7 : ( / p r o c / 1 6 2 8 / s t a t : 6 1 6 8 )

8 9 8 : ( / p r o c / 1 6 3 4 / s t a t : 6 1 6 9 )

8 9 9 : ( / p r o c / 2 0 5 0 / s t a t : 6 1 7 5 )

9 0 0 : ( / p r o c / 2 0 5 2 / s t a t : 6 1 7 6 )

9 0 1 : ( / p r o c / 2 3 8 9 / s t a t : 6 1 7 7 )

9 0 2 : ( / p r o c / 2 3 9 1 / s t a t : 6 1 7 8 )

9 0 3 : ( / p r o c / 2 6 3 2 / s t a t : 6 1 7 9 )

9 0 4 : ( / p r o c / 2 8 1 6 / s t a t : 7 0 7 0 )

9 0 5 : ( / p r o c / 3 0 8 2 / s t a t : 7 2 3 0 )

9 0 6 : ( / p r o c / 3 1 2 5 / s t a t : 7 3 1 4 )

9 0 7 : ( / p r o c / 4 4 1 4 / s t a t : 1 2 5 6 2 )

9 0 8 : ( / p r o c / 4 4 3 2 / s t a t : 1 2 5 6 4 )

9 0 9 : ( / p r o c / 4 5 6 1 / s t a t : 1 2 5 6 6 )

9 1 0 : ( / p r o c / 4 5 6 2 / s t a t : 1 2 5 6 8 )

9 1 1 : ( / p r o c / 4 5 6 6 / s t a t : 1 2 5 7 2 )

9 1 2 : ( / p r o c / 4 5 6 7 / s t a t : 1 2 5 7 4 )

9 1 3 : ( / p r o c / 4 5 6 9 / s t a t : 1 2 5 7 6 )

9 1 4 : ( / p r o c / 4 7 3 3 / s t a t : 1 2 5 7 8 ) 9 1 5 : ( / p r o c / 4 7 7 5 / s t a t : 1 2 5 8 0 )

9 1 6 : ( / p r o c / 4 8 3 8 / s t a t : 1 2 5 8 2 )

9 1 7 : ( / p r o c / 4 9 2 0 / s t a t : 1 2 5 8 9 )

9 1 8 : ( / p r o c / 4 9 3 6 / s t a t : 1 2 5 9 2 )

9 1 9 : ( / p r o c / 4 9 5 0 / s t a t : 1 2 5 9 5 )

9 2 0 : ( / p r o c / 4 9 5 0 / c m d l i n e : 1 2 5 9 6 )

9 2 1 : ( / p r o c / 4 9 6 3 / s t a t : 1 2 5 9 8 )

9 2 2 : ( / p r o c / 4 9 6 3 / c m d l i n e : 1 2 5 9 9 )

9 2 3 : ( / p r o c / 4 9 8 5 / s t a t : 1 2 6 0 1 )

9 2 4 : ( / p r o c / 5 0 3 0 / s t a t : 1 3 3 4 7 )

9 2 5 : ( / p r o c / 5 0 3 1 / s t a t : 1 3 3 4 9 )9 2 6 : ( / p r o c / 5 0 6 5 / s t a t : 1 3 3 5 1 )

9 2 7 : ( / p r o c / 5 1 8 1 / s t a t : 1 3 3 5 3 )

9 2 8 : ( / p r o c / 5 2 0 0 / s t a t : 1 3 3 5 5 )

9 2 9 : ( / p r o c / 5 2 0 3 / s t a t : 1 3 3 5 7 )

9 3 0 : ( / p r o c / 5 2 0 3 / c m d l i n e : 1 3 3 5 8 )

9 3 1 : ( / p r o c / 5 2 6 5 / s t a t : 1 3 3 5 9 )

9 3 2 : ( / p r o c / 5 2 7 7 / s t a t : 1 3 3 6 1 )

9 3 3 : ( / p r o c / 5 2 7 7 / c m d l i n e : 1 3 3 6 2 )

9 3 4 : ( / p r o c / 5 2 8 5 / s t a t : 1 3 3 6 3 )

9 3 5 : ( / p r o c / 5 2 8 5 / c m d l i n e : 1 3 3 6 4 )

9 3 6 : ( / p r o c / 5 2 8 6 / s t a t : 1 3 3 6 5 )

9 3 7 : ( / p r o c / 5 2 8 6 / c m d l i n e : 1 3 3 6 6 )

9 3 8 : ( / p r o c / 5 2 9 3 / s t a t : 1 3 3 6 7 )

9 3 9 : ( / p r o c / 5 2 9 3 / c m d l i n e : 1 3 3 6 8 )

9 4 0 : ( / p r o c / 5 3 3 1 / s t a t : 1 3 3 6 9 )

9 4 1 : ( / p r o c / 5 3 5 4 / s t a t : 1 3 3 7 2 )

9 4 2 : ( / p r o c / 5 3 5 4 / c m d l i n e : 1 3 3 7 3 )

9 4 3 : ( / p r o c / 5 3 6 0 / s t a t : 1 3 3 7 5 )

9 4 4 : ( / p r o c / 5 3 6 5 / s t a t : 1 3 3 7 8 )

9 4 5 : ( / p r o c / 5 3 6 5 / c m d l i n e : 1 3 3 7 9 )

9 4 6 : ( / p r o c / 5 3 9 8 / s t a t : 1 3 5 4 2 )

9 4 7 : ( / p r o c / 5 4 0 1 / s t a t : 1 3 5 4 4 )

9 4 8 : ( / p r o c / 5 4 0 5 / s t a t : 1 3 5 5 1 )

9 4 9 : ( / p r o c / 5 4 4 7 / s t a t : 1 3 5 5 3 )

9 5 0 : ( / p r o c / 5 4 6 1 / s t a t : 1 3 5 5 6 )

9 5 1 : ( / p r o c / 5 5 4 7 / s t a t : 1 7 6 7 7 )

9 5 2 : ( / p r o c / 5 5 6 4 / s t a t : 1 7 6 7 9 )

9 5 3 : ( / p r o c / 5 5 6 6 / s t a t : 1 7 6 8 1 )

9 5 4 : ( / p r o c / 5 5 6 6 / c m d l i n e : 1 9 3 9 7 )

9 5 5 : ( / p r o c / 5 5 6 7 / s t a t : 1 7 6 8 3 )

9 5 6 : ( / p r o c / 5 5 6 7 / c m d l i n e : 1 9 3 9 9 )

9 5 7 : ( / p r o c / 5 6 2 2 / s t a t : 1 7 6 8 5 )

9 5 8 : ( / p r o c / 5 6 2 6 / s t a t : 1 7 6 8 7 )

9 5 9 : ( / p r o c / 5 6 2 7 / s t a t : 1 7 6 8 9 )

9 6 0 : ( / p r o c / 5 6 2 7 / c m d l i n e : 1 9 4 0 4 )

9 6 1 : ( / p r o c / 5 6 3 5 / s t a t : 1 7 6 9 1 )

9 6 3 : ( / p r o c / 5 6 4 5 / s t a t : 1 7 6 9 5 )

9 6 4 : ( / p r o c / 5 6 4 5 / c m d l i n e : 1 9 4 1 0 )

9 6 5 : ( / p r o c / 5 6 4 6 / s t a t : 1 7 6 9 7 )

9 6 6 : ( / p r o c / 5 6 5 2 / s t a t : 1 7 2 0 2 )

9 6 7 : ( / p r o c / 5 6 5 3 / s t a t : 1 7 7 0 0 )

9 6 8 : ( / p r o c / 5 6 6 0 / s t a t : 1 7 7 0 2 )

9 6 9 : ( / p r o c / 5 6 6 0 / c m d l i n e : 1 9 4 1 8 )

9 7 0 : ( / p r o c / 5 6 7 6 / s t a t : 1 7 7 0 4 )

9 7 1 : ( / p r o c / 5 6 8 5 / s t a t : 1 7 7 0 6 )

9 7 2 : ( / p r o c / 5 6 8 5 / c m d l i n e : 1 9 4 2 2 )

9 7 3 : ( / p r o c / 5 6 8 9 / s t a t : 1 7 7 0 8 )

9 7 4 : ( / p r o c / 5 6 8 9 / c m d l i n e : 1 9 4 2 4 )

9 7 5 : ( / p r o c / 5 6 9 2 / s t a t : 1 7 7 1 0 )

9 7 6 : ( / p r o c / 5 6 9 2 / c m d l i n e : 1 9 4 2 6 )

9 7 7 : ( / p r o c / 5 6 9 8 / s t a t : 1 7 7 1 4 )

9 7 8 : ( / p r o c / 5 6 9 8 / c m d l i n e : 1 9 4 2 8 )

9 7 9 : ( / p r o c / 5 6 9 9 / s t a t : 1 7 7 1 6 )

9 8 0 : ( / p r o c / 5 7 0 3 / s t a t : 1 7 7 1 8 )

9 8 1 : ( / p r o c / 5 7 0 6 / s t a t : 1 7 7 2 0 )

9 8 2 : ( / p r o c / 5 7 0 7 / s t a t : 1 7 7 2 2 )

9 8 3 : ( / p r o c / 5 7 0 7 / c m d l i n e : 1 9 4 3 6 )

9 8 4 : ( / p r o c / 5 7 0 8 / s t a t : 1 7 7 2 4 )

9 8 5 : ( / p r o c / 5 7 1 0 / s t a t : 1 6 8 4 9 )

9 8 6 : ( / p r o c / 5 7 1 0 / c m d l i n e : 1 9 4 4 0 )

9 8 7 : ( / p r o c / 5 7 2 5 / s t a t : 1 7 7 2 7 )

9 8 8 : ( / p r o c / 5 7 2 8 / s t a t : 1 7 7 2 9 )

9 8 9 : ( / p r o c / 5 7 3 0 / s t a t : 1 7 7 3 1 )

9 9 0 : ( / p r o c / 5 7 4 3 / s t a t : 1 7 7 3 3 )9 9 1 : ( / p r o c / 5 7 4 8 / s t a t : 1 7 7 3 5 )

9 9 2 : ( / p r o c / 5 7 4 8 / c m d l i n e : 1 9 4 5 0 )

9 9 3 : ( / p r o c / 5 7 8 6 / s t a t : 1 9 4 5 2 )

9 9 4 : ( / p r o c / 5 7 8 6 / c m d l i n e : 1 9 4 5 3 )

9 9 5 : ( / p r o c / 5 7 9 4 / s t a t : 1 9 4 5 5 )

9 9 6 : ( / p r o c / 5 7 9 4 / c m d l i n e : 1 9 4 5 6 )

9 9 7 : ( / p r o c / 5 7 9 8 / s t a t : 1 9 4 5 8 )

9 9 8 : ( / p r o c / 5 8 0 0 / s t a t : 1 9 4 6 1 )

9 9 9 : ( / p r o c / 5 8 0 0 / c m d l i n e : 1 9 4 6 2 )

1 0 0 0 : ( / p r o c / 5 8 0 1 / s t a t : 1 9 4 6 4 )

1 0 0 1 : ( / p r o c / 5 8 1 8 / s t a t : 1 9 4 6 7 )

1 0 0 2 : ( / p r o c / 5 8 1 9 / s t a t : 1 9 4 7 0 )

1 0 0 3 : ( / p r o c / 5 8 5 5 / s t a t : 1 9 4 7 3 )

1 0 0 4 : ( / p r o c / 5 8 5 7 / s t a t : 1 9 4 7 6 )

1 0 0 5 : ( / p r o c / 5 8 8 5 / s t a t : 1 9 4 7 9 )

1 0 0 6 : ( / p r o c / 5 8 8 5 / c m d l i n e : 1 9 4 8 0 )

1 0 0 7 : ( / p r o c / 6 2 8 5 / s t a t : 1 9 4 8 2 )

1 0 0 8 : ( / p r o c / 6 3 0 4 / s t a t : 1 9 4 8 5 )

1 0 0 9 : ( / p r o c / 6 3 2 0 / s t a t : 1 9 4 8 8 )

1 0 1 0 : ( / p r o c / 6 3 2 1 / s t a t : 1 9 4 9 1 )

1 0 1 1 : ( / p r o c / 6 3 3 9 / s t a t : 2 0 2 9 7 )

1 0 1 2 : ( / p r o c / 6 6 8 5 / s t a t : 2 0 2 9 8 )

1 0 1 3 : ( / p r o c / 6 7 1 8 / s t a t : 2 0 2 9 9 )

1 0 1 4 : ( / p r o c / 6 7 1 9 / s t a t : 2 0 3 0 0 )

1 0 1 5 : ( / p r o c / 6 7 4 2 / s t a t : 2 0 3 0 1 )1 0 1 6 : ( / p r o c / 6 7 5 2 / s t a t : 2 0 3 0 2 )

1 0 1 7 : ( / p r o c / 6 7 8 1 / s t a t : 2 0 3 0 3 )

1 0 1 8 : ( / p r o c / 6 7 8 3 / s t a t : 2 0 3 0 4 )

1 0 1 9 : ( / p r o c / 6 7 8 3 / c m d l i n e : 2 0 3 0 5 )

1 0 2 1 : ( / b i n / u n a m e : 5 3 2 5 9 5 )

1 0 2 3 : ( / b i n / c a t : 5 3 2 4 9 8 )

1 0 2 4 : ( / p r o c / s y s / v m / m m a p _ m i n _ a d d r : 1 1 6 4 3 )

1 0 2 5 : ( / u s r / b i n / c c : 2 7 5 2 6 1 9 )

1 0 3 4 : ( / t m p / c c c XQx Zn . s : 2 9 8 4 2 2 2 )

1 0 9 8 : ( / t m p / c c f RR3 4 r . o : 2 9 8 4 2 2 3 )

1 0 2 7 : ( / u s r / b i n / g c c - 4 . 2 : 2 7 5 2 8 4 3 )

1 0 2 8 : ( / u s r : 2 7 5 2 5 1 3 )

1 0 2 9 : ( / u s r / b i n : 2 7 5 2 5 1 5 ) 1 0 3 0 : ( / e t c : 1 4 9 0 9 4 5 )

1 0 3 1 : ( / e t c / a l t e r n a t i v e s : 1 4 9 0 9 5 2 )

1 0 3 2 : ( / e t c / a l t e r n a t i v e s / c c : 1 4 9 1 4 5 5 )

1 0 3 3 : ( / u s r / b i n / g c c : 2 7 5 2 8 4 2 )

1 0 3 6 : ( / u s r / l o c a l / i n c l u d e : 2 8 5 1 6 1 0 )

1 0 3 7 : ( / u s r / i n c l u d e : 2 7 5 2 5 1 7 )

1 0 3 8 : ( / u s r / i n c l u d e / a s m / u n i s t d . h : 2 8 0 3 9 4 0 )

1 0 3 9 : ( / u s r / i n c l u d e / a s m / u n i s t d _ 3 2 . h : 2 8 0 3 9 4 1 )

1 0 4 0 : ( / u s r / i n c l u d e / s i g n a l . h : 2 7 5 5 0 6 5 )

1 0 4 1 : ( / u s r / i n c l u d e / f e a t u r e s . h : 2 7 5 5 0 1 7 )

1 0 4 2 : ( / u s r / i n c l u d e / s y s / c d e f s . h : 3 1 8 6 8 8 9 )

1 0 4 3 : ( / u s r / i n c l u d e / b i t s / wo r d s i z e . h : 3 1 8 6 7 7 6 )

1 0 4 4 : ( / u s r / i n c l u d e / g n u / s t u b s . h : 3 1 8 6 7 6 8 )

1 0 4 5 : ( / u s r / i n c l u d e / g n u / s t u b s - 3 2 . h : 3 1 8 6 7 6 9 )

1 0 4 6 : ( / u s r / i n c l u d e / b i t s / s i g s e t . h : 3 1 8 6 8 7 0 )

1 0 4 7 : ( / u s r / i n c l u d e / b i t s / t y p e s . h : 3 1 8 6 8 5 7 )

1 0 4 8 : ( / u s r / i n c l u d e / b i t s / t y p e s i z e s . h : 3 1 8 6 8 3 0 )

1 0 4 9 : ( / u s r / i n c l u d e / b i t s / s i g n u m . h : 3 1 8 6 8 1 3 )

1 0 5 0 : ( / u s r / i n c l u d e / t i m e . h : 2 7 5 4 9 9 8 )

1 0 5 1 : ( / u s r / i n c l u d e / b i t s / s i g i n f o . h : 3 1 8 6 7 8 6 )

1 0 5 2 : ( / u s r / i n c l u d e / b i t s / s i g a c t i o n . h : 3 1 8 6 8 3 8 )

1 0 5 3 : ( / u s r / i n c l u d e / b i t s / s i g c o n t e x t . h : 3 1 8 6 7 9 1 )

1 0 5 4 : ( / u s r / i n c l u d e / b i t s / s i g s t a c k . h : 3 1 8 6 8 6 6 )

1 0 5 5 : ( / u s r / i n c l u d e / b i t s / p t h r e a d t y p e s . h : 3 1 8 6 8 2 7 )

1 0 5 6 : ( / u s r / i n c l u d e / b i t s / s i g t h r e a d . h : 3 1 8 6 8 0 4 )

1 0 5 7 : ( / u s r / i n c l u d e / s t d i n t . h : 2 7 5 5 0 0 5 )

1 0 5 8 : ( / u s r / i n c l u d e / b i t s / wc h a r . h : 3 1 8 6 8 5 0 )

1 0 5 9 : ( / u s r / i n c l u d e / s t d i o . h : 2 7 5 5 0 6 3 )

1 0 6 0 : ( / u s r / i n c l u d e / _ G_ c o n f i g . h : 2 7 5 5 0 4 1 )

1 0 6 1 : ( / u s r / i n c l u d e / wc h a r . h : 2 7 5 5 0 4 7 )

1 0 6 2 : ( / u s r / i n c l u d e / b i t s / s t d i o _ l i m . h : 3 1 8 6 8 5 2 )

1 0 6 3 : ( / u s r / i n c l u d e / b i t s / s y s _ e r r l i s t . h : 3 1 8 6 8 2 5 )

1 0 6 4 : ( / u s r / i n c l u d e / s t d l i b . h : 2 7 5 5 0 4 8 )

1 0 6 5 : ( / u s r / i n c l u d e / s y s / t y p e s . h : 3 1 8 6 9 4 1 )

1 0 6 6 : ( / u s r / i n c l u d e / e n d i a n . h : 2 7 5 5 0 4 9 )

1 0 6 7 : ( / u s r / i n c l u d e / b i t s / e n d i a n . h : 3 1 8 6 8 5 5 )

1 0 6 8 : ( / u s r / i n c l u d e / s y s / s e l e c t . h : 3 1 8 6 9 5 3 )

1 0 6 9 : ( / u s r / i n c l u d e / b i t s / s e l e c t . h : 3 1 8 6 8 7 2 )

1 0 7 0 : ( / u s r / i n c l u d e / b i t s / t i m e . h : 3 1 8 6 8 1 5 )

1 0 7 1 : ( / u s r / i n c l u d e / s y s / s y s m a c r o s . h : 3 1 8 6 9 2 2 )

1 0 7 2 : ( / u s r / i n c l u d e / a l l o c a . h : 2 7 5 5 0 3 1 )

1 0 7 3 : ( / u s r / i n c l u d e / s t r i n g . h : 2 7 5 4 9 9 3 )

1 0 7 4 : ( / u s r / i n c l u d e / s y s / f i l e . h : 3 1 8 6 9 1 7 )

1 0 7 5 : ( / u s r / i n c l u d e / f c n t l . h : 2 7 5 4 9 7 0 )

1 0 7 6 : ( / u s r / i n c l u d e / b i t s / f c n t l . h : 3 1 8 6 7 7 4 )

1 0 7 7 : ( / u s r / i n c l u d e / s y s / m m a n . h : 3 1 8 6 8 8 1 )

1 0 7 8 : ( / u s r / i n c l u d e / b i t s / m m a n . h : 3 1 8 6 7 8 0 )

1 0 7 9 : ( / u s r / i n c l u d e / s y s / s e n d f i l e . h : 3 1 8 6 9 3 8 )

1 0 8 0 : ( / u s r / i n c l u d e / s y s / s o c k e t . h : 3 1 8 6 9 1 1 )

1 0 8 1 : ( / u s r / i n c l u d e / s y s / u i o . h : 3 1 8 6 9 5 0 )

1 0 8 2 : ( / u s r / i n c l u d e / b i t s / u i o . h : 3 1 8 6 8 6 7 )

1 0 8 3 : ( / u s r / i n c l u d e / b i t s / s o c k e t . h : 3 1 8 6 8 1 9 )

1 0 8 4 : ( / u s r / i n c l u d e / l i m i t s . h : 2 7 5 4 9 8 4 )

1 0 8 5 : ( / u s r / i n c l u d e / b i t s / p o s i x 1 _ l i m . h : 3 1 8 6 8 0 2 )

1 0 8 6 : ( / u s r / i n c l u d e / b i t s / l o c a l _ l i m . h : 3 1 8 6 8 3 2 )

1 0 8 7 : ( / u s r / i n c l u d e / l i n u x / l i m i t s . h : 3 1 8 0 8 9 8 )

1 0 8 8 : ( / u s r / i n c l u d e / b i t s / p o s i x 2 _ l i m . h : 3 1 8 6 8 1 7 )

1 0 8 9 : ( / u s r / i n c l u d e / b i t s / s o c k a d d r . h : 3 1 8 6 8 3 4 )

1 0 9 0 : ( / u s r / i n c l u d e / a s m / s o c k e t . h : 2 8 0 3 9 3 3 )1 0 9 1 : ( / u s r / i n c l u d e / a s m / s o c k i o s . h : 2 8 0 3 9 3 4 )

1 0 9 2 : ( / u s r / i n c l u d e / s y s / u s e r . h : 3 1 8 6 9 2 3 )

1 0 9 3 : ( / u s r / i n c l u d e / u n i s t d . h : 2 7 5 4 9 9 5 )

1 0 9 4 : ( / u s r / i n c l u d e / b i t s / p o s i x _ o p t . h : 3 1 8 6 7 9 4 )

1 0 9 5 : ( / u s r / i n c l u d e / b i t s / c o n f n a m e . h : 3 1 8 6 8 6 9 )

1 0 9 6 : ( / u s r / i n c l u d e / g e t o p t . h : 2 7 5 5 0 3 3 )

1 0 9 7 : ( / u s r / i n c l u d e / s y s / p e r s o n a l i t y . h : 3 1 8 6 9 0 6 )1 1 0 0 : ( / u s r / b i n / a s : 2 7 5 2 5 6 8 )

1 1 0 5 : ( / t m p / c c 6 6 o f x d . c : 2 9 8 4 2 2 4 )

1 1 0 6 : ( / t m p / c c 2 7 J S Ug . o : 2 9 8 4 2 2 5 )

1 1 0 7 : ( / t m p / c c i 7 i q i k . l d : 2 9 8 4 2 2 6 )

1 1 0 8 : ( / t m p / c c G2 P 2 Hn . l e : 2 9 8 4 2 2 7 )

1 1 0 2 : ( / u s r / b i n / l d : 2 7 5 3 0 9 6 )

1 1 0 3 : ( / u s r / b i n / n m : 2 7 5 3 2 0 9 )

1 1 0 4 : ( / u s r / b i n / s t r i p : 2 7 5 3 5 2 2 )

1 1 1 1 : ( / t m p / c c QXp wLK. s : 2 9 8 4 2 2 6 )

1 1 1 5 : ( / t m p / c c UZc d 3 t . o : 2 9 8 4 2 2 7 )

1 1 1 3 : ( / u s r / i n c l u d e / s y s / s t a t . h : 3 1 8 6 8 8 5 )

1 1 1 4 : ( / u s r / i n c l u d e / b i t s / s t a t . h : 3 1 8 6 7 8 7 )

1 1 1 8 : ( / t m p / c c t KW e p V. c : 2 9 8 4 2 2 8 )

1 1 1 9 : ( / t m p / c c W Dc TEG. o : 2 9 8 4 2 2 9 )

1 1 2 0 : ( / t m p / c c Hwv ZUr . l d : 2 9 8 4 2 3 0 )

1 1 2 1 : ( / t m p / c c q U6 u b d . l e : 2 9 8 4 2 3 1 )

1 1 2 5 : ( p e r s o n a l i t y : P ER_ S VR4 )

1 1 3 1 : ( / t m p / p u l s e - c a r t : 2 9 8 4 0 8 0 )

1 1 3 2 : ( / t m p / p u l s e - c a r t / p i d : 2 9 8 4 0 8 1 )

1 1 3 5 : ( / d e v / s h m / p u l s e - s h m - 4 8 6 9 8 0 8 3 0 : 2 0 3 2 5 )

1 1 3 7 : ( / t m p / . e s d - 1 0 0 0 : 2 9 8 4 0 8 2 )

1 1 3 8 : ( / t m p / . e s d - 1 0 0 0 / s o c k e t : 2 9 8 4 0 8 3 )

1 1 3 9 : ( / h o m e / c a r t / . e s d _ a u t h : 9 7 4 8 8 3 )

1 1 4 0 : ( / t m p / p u l s e - c a r t / n a t i v e : 2 9 8 4 0 8 4 )

1 1 4 1 : ( / h o m e / c a r t / . p u l s e - c o o k i e : 9 7 4 8 8 5 )

1 1 4 4

1 1 5 2

1 1 5 4 : ( / t m p / s e n d f i l e . p 4 l b t q : 2 9 8 4 2 3 1 )

1 1 2 6 : ( / u s r / b i n / p u l s e a u d i o : 2 7 5 3 3 6 7 )

1 1 2 7 : ( / e t c / p u l s e / d e f a u l t . p a : 1 4 9 2 3 8 3 )

1 1 2 8 : ( / e t c / p u l s e / d a e m o n . c o n f : 1 4 9 2 3 8 2 )

1 1 2 9 : ( / p r o c / s y s / k e r n e l / n g r o u p s _ m a x : 1 2 3 6 8 )

1 1 3 0 : ( / d e v / u r a n d o m : 1 9 4 0 )

1 1 3 3 : ( / d e v / s h m : 1 1 5 9 6 )

1 1 3 4 : ( / d e v / s h m / p u l s e - s h m - 1 9 8 7 4 7 1 5 3 0 : 1 4 7 5 2 )

1 1 4 2 : ( / h o m e / c a r t / . p u l s e / d e f a u l t - s i n k : 9 7 5 0 0 3 )

1 1 4 3 : ( / h o m e / c a r t / . p u l s e / d e f a u l t - s o u r c e : 9 7 5 0 0 4 )

1 1 4 5 : ( / p r o c / 6 8 0 6 / f d : 2 0 3 3 8 )

1 1 4 8 : ( / h o m e / c a r t / . Xa u t h o r i t y : 9 7 5 0 6 8 )

1 1 4 9 : ( / e t c / h o s t . c o n f : 1 4 9 1 0 9 4 )

1 1 5 0 : ( / e t c / r e s o l v . c o n f : 1 4 9 2 2 1 2 )

1 1 5 1 : ( / e t c / h o s t s : 1 4 9 1 4 8 7 )

1 1 5 3 : ( / p r o c / k a l l s y m s : 4 0 2 6 5 3 1 9 6 6 )

1 1 5 8 : ( / b i n / d a s h : 5 3 2 5 0 4 )

1 1 6 3 : ( / e t c / . p wd . l o c k : 1 4 9 1 0 6 5 )

1 1 6 4

1 1 6 5

1 1 6 6

1 1 6 7

1 1 6 8

1 1 6 9 : ( / e t c / g r o u p . 6 8 1 1 : 1 4 9 3 1 0 5 )

1 1 7 0 : ( / e t c / g r o u p . l o c k : 1 4 9 3 1 0 5 )

1 1 7 1

1 1 7 2

1 1 7 3

1 1 7 5

1 1 7 6

1 1 7 7

1 1 7 8

1 1 7 9 : ( / e t c / g r o u p - : 1 4 9 1 0 8 9 )

1 1 8 0 : ( / e t c / g r o u p + : 1 4 9 3 1 0 9 )

1 1 8 1

1 1 8 2

1 1 6 0 : ( / u s r / s b i n / u s e r a d d : 2 7 5 4 9 3 4 )

1 1 6 1 : ( / p r o c / 6 8 1 1 / m o u n t s : 2 0 3 7 6 )

1 1 6 2 : ( / e t c / d e f a u l t / u s e r a d d : 1 4 9 1 8 9 2 )

1 1 7 4 : ( / e t c / l o g i n . d e f s : 1 4 9 1 1 0 8 )

1 1 8 4 : ( / p r o c / 6 8 1 2 / m o u n t s : 2 0 3 9 5 )

1 1 8 7 : ( 4 9 8 5 : 1 : s s h d )

1 1 8 8 : ( 1 7 2 . 1 8 . 3 4 . 1 0 : 2 2 )

1 1 8 9

1 2 0 6

1 1 9 0 : ( 1 9 2 . 1 6 8 . 2 0 2 . 2 : 5 3 4 3 3 )

1 1 9 6 : ( 1 7 2 . 1 8 . 3 4 . 1 0 : 5 9 5 9 0 )

1 1 9 7 : ( 1 7 2 . 1 8 . 3 4 . 1 0 : 0 )

1 1 9 8 : ( 1 7 2 . 1 8 . 3 4 . 1 0 : 4 8 3 4 7 )

1 2 0 8 : ( 1 0 . 1 0 . 1 0 . 3 : 4 9 8 4 2 )

1 2 1 0 : ( 1 0 . 1 0 . 1 0 . 3 : 5 0 9 6 7 )

1 2 1 2 : ( 1 0 . 1 0 . 1 0 . 3 : 4 9 1 3 1 )

1 1 9 2 : ( / u s r / s b i n / s s h d : 2 7 5 3 4 2 1 )

1 1 9 3 : ( / p r o c / 6 8 1 3 / m o u n t s : 2 0 4 0 6 )

1 1 9 4 : ( / p r o c / 6 8 1 3 / f d : 2 0 4 0 7 )

1 1 9 5 : ( / e t c / g a i . c o n f : 1 4 9 1 0 8 6 )

1 1 9 9 : ( / e t c / s s h / s s h _ h o s t _ r s a _ k e y : 1 4 9 2 5 8 4 )

1 2 0 0 : ( / e t c / s s h / b l a c k l i s t . RS A- 2 0 4 8 : 1 4 9 3 0 6 5 )

1 2 0 1 : ( / e t c / s s h / s s h _ h o s t _ d s a _ k e y : 1 4 9 3 0 8 6 )

1 2 0 2 : ( / e t c / s s h / b l a c k l i s t . DS A- 1 0 2 4 : 1 4 9 3 0 2 2 )

1 2 0 3 : ( / e t c / p r o t o c o l s : 1 4 9 1 1 3 8 )

1 2 0 4 : ( / e t c / h o s t s . a l l o w: 1 4 9 1 0 9 6 )

1 2 0 5 : ( / e t c / h o s t s . d e n y : 1 4 9 1 0 9 7 )

1 2 0 7 : ( / e t c / s s h / m o d u l i : 1 4 9 2 7 2 5 )

1 2 0 9 : ( 2 0 8 . 6 7 . 2 2 2 . 2 2 2 : 5 3 )

1 2 1 1 : ( 2 0 8 . 6 7 . 2 2 0 . 2 2 0 : 5 3 )

1 2 1 3 : ( 1 3 0 . 2 0 3 . 1 3 5 . 1 7 5 : 5 3 )

1 2 1 4 : ( / b i n / b a s h : 5 3 2 4 8 5 )

1 2 1 5 : ( / e t c / p a m . d : 1 4 9 1 0 2 3 )

1 2 1 6 : ( / e t c / p a m . d / s s h d : 1 4 9 3 0 7 9 )

1 2 1 7 : ( / e t c / p a m . d / c o m m o n - a u t h : 1 4 9 2 3 3 2 )

1 2 1 8 : ( / e t c / p a m . d / c o m m o n - a c c o u n t : 1 4 9 2 3 3 1 )

1 2 1 9 : ( / e t c / p a m . d / c o m m o n - s e s s i o n : 1 4 9 2 3 3 4 )1 2 2 0 : ( / e t c / p a m . d / c o m m o n - p a s s wo r d : 1 4 9 2 3 3 3 )

1 2 2 1 : ( / e t c / p a m . d / o t h e r : 1 4 9 2 3 4 1 )

1 2 2 2 : ( / e t c / s e c u r i t y / p a m _ e n v . c o n f : 1 4 9 2 6 9 4 )

1 2 2 3 : ( / e t c / e n v i r o n m e n t : 1 4 9 1 0 8 3 )

1 2 2 4 : ( / e t c / d e f a u l t / l o c a l e : 1 4 9 3 0 2 1 )

1 2 2 6 : ( / e t c / s e c u r i t y / l i m i t s . c o n f : 1 4 9 2 6 9 0 )

1 2 2 9 : ( 5 2 6 5 : 5 2 0 0 : h a l d - r u n n e r )

1 2 3 1 : ( / p r o c / 6 8 1 6 / f d : 2 0 4 4 8 )

1 2 3 2 : ( / e t c / P o l i c y Ki t / P o l i c y Ki t . c o n f : 1 4 9 1 1 6 5 )

1 2 3 4 : ( / e t c / p r o f i l e : 1 4 9 1 1 3 7 )

1 2 3 5 : ( / e t c / p r o f i l e . d : 1 4 9 1 0 3 0 )

1 2 3 7 : ( / p r o c / 6 8 1 7 / m o u n t s : 2 0 4 6 5 )

1 2 3 8 : ( / u s r / b i n / g r o u p s : 2 7 5 2 9 9 0 )

1 2 4 0 : ( / u s r / b i n / i d : 2 7 5 3 0 6 2 )

1 2 4 1 : ( / p r o c / 6 8 1 9 / m o u n t s : 2 0 4 7 1 )

1 2 4 3 : ( / e t c / t e r m i n f o : 1 4 9 1 0 5 4 )

1 2 4 4 : ( / e t c / i n p u t r c : 1 4 9 1 0 9 8 )

1 2 4 5 : ( / p r o c / 6 8 2 0 / m o u n t s : 2 0 4 7 8 )

1 2 4 7 : ( / p r o c / 6 8 2 1 / f d : 2 0 4 8 7 )

1 2 4 9 : ( / p r o c / 6 8 2 2 / m o u n t s : 2 0 5 0 1 )

1 2 5 1 : ( / p r o c / 6 8 2 3 / m o u n t s : 2 0 5 0 8 )

1 2 5 3 : ( / p r o c / 6 8 2 4 / f d : 2 0 5 1 7 )

1 2 5 5 : ( / p r o c / 6 8 2 5 / m o u n t s : 2 0 5 3 1 )

1 2 5 7 : ( / p r o c / 6 8 2 6 / m o u n t s : 2 0 5 3 8 )

1 2 5 9 : ( / p r o c / 6 8 2 7 / m o u n t s : 2 0 5 4 6 )

1 2 6 2 : ( / p r o c / 6 8 2 9 / m o u n t s : 2 0 5 5 1 )

1 2 6 3 : ( / u s r / b i n / t o u c h : 2 7 5 3 5 6 2 )

1 2 6 6 : ( / v i r u s : 2 4 6 1 0 )

1 2 6 5 : ( / b i n / t o u c h : 5 3 2 5 9 1 )

1 2 6 7 : ( / u s r / b i n / wh o a m i : 2 7 5 3 6 4 7 )

1 2 7 0 : ( / p r o c / 6 8 3 2 / m o u n t s : 2 0 5 5 9 )

1 2 7 2 : ( / p r o c / 6 8 3 3 / m o u n t s : 2 0 5 6 2 )

1 2 7 3 : ( / b i n / r m : 5 3 2 5 7 0 )

1 2 7 6 : ( / p r o c / 6 8 3 5 / m o u n t s : 2 0 5 6 6 )

1 2 7 8 : ( / u s r / l o c a l : 2 7 5 2 5 1 9 )

1 2 7 9 : ( / u s r / l o c a l / s b i n : 2 8 5 1 6 1 2 )

1 2 8 0 : ( / u s r / l o c a l / b i n : 2 8 5 1 6 0 7 )

1 2 8 1 : ( / u s r / s b i n : 2 7 5 2 5 2 0 )

1 2 8 2 : ( / s b i n : 3 3 9 9 6 8 1 )

1 2 8 3 : ( / b i n : 5 3 2 4 8 1 )

1 2 8 4 : ( / u s r / g a m e s : 2 7 5 2 5 1 6 )

(a) An example 3-host SODG for the attackscenario in Fig. 1, with 1288 OS objects from143120 system calls (Table 4 in Appendix). TheSIPPs hidden in it is highlighted in red color.

SSH ServerNFS Server

Workstation 1

225

224

417

518

519

522

523

524

532533

536537

543

234

527

528

529

540

541

542

544

79

1732

78

80663

661

670 671

743

664 672

694

692

696

741747

748

769

770

1225

1271

775779

783

858

127412751277

1285

778

784

790791

792

793794

795796

797798

799

800

801

802

803

804

805

806

807 808809

810

811

812

813

814815

816

817

818

819820

821

851

854

822856

859

863

1123

1035

869

871

1112

1183

1109

1122

862

864

868

874

877

10201022

1026

1110

1125

1131

1132 1135

1137

1138

11391140

11411144

1152

11541159

1034

8731111

865

867

962

1098

1099

1101

1115

1116

1117

788789

1163 1164

1165

1166

1167

1168

1169

11701171

1172

1173

11751176

1177

1178

11791180

1181

1182

744

749

1136

1191

1230

1233

1239

1242

1246

1248

1250

1252

1254

1256

1268

1260

1189

1206

12081210

1212

(b) The red colored SIPPs hidden in (a), with175 OS objects (Table 4). The trigger node ishighlighted in red color and other verified mali-cious nodes in grey.

Fig. 2: This figure is to show what the SODG and SIPPs are like. A box contains a per-host SODG,in which a rectangle denotes a process, a diamond denotes a socket, and an ellipse denotes a file.They look unreadable because of the fine granularity at OS-level and the scale of network. Readersare not expected to understand the details. A main merit of Patrol is that it can dig out SIPPs fromthe network-wide SODG.

that a file depends on a process (process→file). Table 1 gives the dependencyrules to help generate dependency relations from system calls. start and endrespectively denote the timestamp at which a system call is invoked and returned.

Definition 1. per-host System Object Dependency GraphIf the system call trace for the i-th host is denoted as Σi, then the per-hostSODG for the host is a directed graph G(Vi, Ei), where:

– Vi is the set of nodes, and initialized to empty set ∅;– Ei is the set of directed edges, and initialized to empty set ∅;– If a system call syscall∈Σi, and dep is the dependency relation parsed from

syscall according to dependency rules in Table 1, where dep∈{(src→sink),(src←sink), (src↔sink)}, src and sink are OS objects (mainly a process,file or socket), then Vi = Vi∪{src, sink}, Ei = Ei∪{dep}. dep inherits times-tamps start and end from syscall ;

– If (a→b)∈Ei and (b→c)∈Ei, then c transitively depends on a.

As shown in Definition 2, the network-wide SODG is constructed by recur-sively concatenating the per-host SODGs. If and only if at least one directededge exists between two nodes from two different SODGs, these two SODGs canbe concatenated together (by the ∪ operation in Cantor set theory).

Definition 2. network-wide System Object Dependency GraphIf the per-host SODG for the i-th host is denoted as G(Vi, Ei), then the network-wide SODG can be denoted as ∪G(Vi, Ei), where:

– ∪G(V2, E2)=G(V1, E1)∪G(V2, E2)=G(∪V2, ∪E2), iff ∃obj1∈V1, obj2∈V2

and dep1,2∈∪E2, where dep1,2∈{obj1←obj2, obj1→obj2, obj1↔obj2}. ∪V2 de-notes V1∪V2, and ∪E2 denotes E1∪E2;

– ∪G(Vi, Ei)={∪G(Vi−1, Ei−1)}∪G(Vi, Ei)=G(∪Vi, ∪Ei), iff ∃obji−1∈∪Vi−1,obji∈Vi and depi−1,i∈∪Ei, where depi−1,i∈{obji−1←obji, obji−1→obji, obji−1

↔obji}. ∪Vi denotes V1∪· · ·∪Vi, and ∪Ei denotes E1∪· · ·∪Ei.

Patrol 5

Table 1: System call dependency rules.Dependency Events System callsprocess→file process modifies file write, pwrite64, rename, mkdir, linkat, link, sym-

linkat, symlink, fchmodat, fchmod, chmod, fchownat,mount

file→process process uses but does not modifyfile

stat64, lstat64, fstat64, open, read, pread64, execve,mmap2, mprotect, linkat, link, symlinkat, symlink

process↔file process uses and modifies file open, rename, mount, mmap2, mprotectprocess→process process creation or termination vfork, fork, killprocess↔process process creation cloneprocess→socket process writes socket write, pwrite64socket→process process checks or reads socket fstat64, read, pread64process↔socket process writes socket mount, connect, accept, bind, sendto, send, sendmsg,

recvfrom, recv, recvmsgsocket↔socket process reads or writes socket connect, accept, sendto, sendmsg, recvfrom, recvmsg

The network-wide SODG is inherently a set of paths. A zero-day attackpath will be one of them if it exists. Hence, we propose to identify suspiciousintrusion propagation paths (SIPPs) in the network-wide SODG as candidatezero-day attack paths.

As in Definition 3, the SIPPs are a subgraph of the network-wide SODG, ofwhich the OS objects are all “suspicious”: given a trigger node tn, they eitherhave affected tn through direct or transitive dependency relations before lat(tn),or have been affected by tn after eat(tn). Trigger nodes refer to SODG objectsthat are involved in the alerts from existing security sensors, such as Snort [21],Tripwire [22], or our system itself.1 We assume trigger nodes can be noticed byadministrators. The SIPPs inherently reveal the attacker’s trace at OS level.Fig. 2b gives an example of the SIPPs hidden in the 3-host SODG, using theSSH socket (node 225 ) noticed from the Snort alert “SSH potential brute forceattack” as the trigger node.

Definition 3. Suspicious Intrusion Propagation Paths (SIPPs)If the network-wide SODG is denoted as ∪G(Vi, Ei), where G(Vi, Ei) denotesthe per-host SODG for the i-th host, then the SIPPs are a subgraph of ∪G(Vi,Ei), denoted as G(V ′, E′), where:

– V ′ is the set of nodes, and V ′⊂ ∪Vi;– E′ is the set of directed edges, and E′⊂ ∪Ei;– V ′ is initialized to include trigger nodes only;– For ∀obj′∈V ′, if ∃obj∈ ∪Vi where (obj→obj′)∈ ∪Ei and start(obj→obj′)≤lat(obj′), then V ′=V ′∪{obj} and E′=E′∪{(obj→obj′)}. lat(obj′) maintainsthe latest access time to obj′ by edges in E′;

– For ∀obj′∈V ′, if ∃obj∈ ∪Vi where (obj′→obj )∈ ∪Ei and end(obj′→obj )≥eat(obj′), then V ′=V ′∪{obj} and E′=E′∪{(obj′→obj )}. eat(obj′) main-tains the earliest access time to obj′ by edges in E′.

A network-wide SODG can be unmanageably complex. A main merit of Pa-trol is that it can dig out SIPPs from the network-wide SODG. The size of theidentified SIPPs is much smaller (see Table 4 in Appendix for the statistics ofthe 3-host SODG and SIPPs in Fig 2). The SIPPs will include almost all thezero-day attack paths. The only possible way for a zero-day attack path to escapeSIPPs is that it includes only zero-day exploits on all compromised hosts. This

1To reduce dependency on efficiency of security monitoring tools, Patrol implements another mode:heavy mode, in which Patrol feeds itself with its own alerts as seeds.

6 Jun Dai, Xiaoyan Sun, and Peng Liu

PATROL System

SODG Graph Generation

Host A

Host B

Host C

System call trace A

System call trace C

SODG A

SODG B

SODG C Alerts

SIPPsMatched Shadow

IndicatorsNetwork-wide

SODG

System Call Auditing and Filtering Per-host SODG Generation Inter-host SODG Generation

SIPPs Identification Shadow Indicator

Checking

Trigger Nodes Patrol Rules

On-line System Call Log Off-line Centric Analysis

System call trace B

Filtering Rules

Dependency Rules

Fig. 3: System overview of Patrol.

is very rare and unlikely, because it’s almost impossible for attackers to exploitonly zero-day vulnerabilities along the path. Therefore, a zero-day attack pathwill be a path in SIPPs if it exists. Section 3.5 will propose a method to helprecognize highly suspicious candidate zero-day attack paths among the SIPPs.

3 System Design

3.1 System Overview

Fig. 3 shows the overview of our system. It consists of four components:System call auditing and filtering. We first perform system call auditing on

each host, and then send the system call traces from individual hosts to theanalysis machine after filtering (according to filtering rules). Among the fourcomponents, only system call auditing and filtering is on the fly. The other threeare performed off-line, to reduce overhead imposed on individual hosts.

SODG graph generation. To construct a network-wide SODG, two steps areneeded: per-host SODG generation and inter-host SODG generation. First, thecollected system call logs are parsed based on dependency rules to build per-hostSODGs. Then, per-host SODGs are concatenated into a network-wide SODG.

SIPPs identification. To dig out the SIPPs “hidden” inside the network-wide SODG, trigger nodes are used as seeds to track the forward and backwardOS dependencies across the boundaries of individual hosts. These dependenciesidentify the nodes and edges of SIPPs.

Shadow indicator checking. To help identify highly suspicious candidate zero-day attack paths among the SIPPs, we also perform shadow indicator checking,which is a new technique that we will present in Section 3.5.

3.2 System Call Auditing and Filtering

Several requirements are expected for system call auditing: 1) System call au-diting should be done against all running processes, rather than against specificprocesses. It’s hard to pre-determine which process to audit, so process-specificsystem call auditing could miss important system calls that carry critical intru-sion information. 2) System call auditing should be network-wide, meaning that:first, all hosts of the network should be audited; second, the socket communi-cations between hosts should be captured. Network-wide system call auditing isthe basis for identifying suspicious paths across hosts. 3) Sufficient OS-aware in-formation should be preserved for accurate OS object identification. Due to the

Patrol 7

reuse of process ID and file descriptor numbers, it’s inaccurate to identify systemprocesses and files solely by their IDs or descriptor numbers. 4) The time thata system call is invoked and returned should be recorded. Time information canlater help determine whether a system call is involved in intrusion propagation.

Considering unfiltered data would cause more bandwidth/CPU costs on datatransfer and analysis, system calls are filtered before being sent to the analysismachine. Some filtering rules are applied to prune system calls which involveOS objects that are either highly redundant or possibly innocent. This is calledfiltering preprocessing, which can boost the speed of graph generation and reducethe complexity of resulted graphs. For example, we currently perform pruningfor the following objects: 1) The dynamic linked library files like libc.so.∗ andlibm.so.∗. They are loaded every time an executable is run, and thus cause alot of redundancy; 2) Dummy objects like stdin/stdout and /dev/null ; 3) Ob-jects about pseudo-terminal master and slave (/dev/ptmx and /dev/pts); 4) Logrelevant objects like syslogd and /var/log/∗; 5) Objects relevant with systemmaintenance (apt-get and apt-config). More filtering rules could be specified toprune more system calls, gaining better speed boosting. However, it also takesmore risk filtering out objects involved in vulnerability exploitations. Due to thistradeoff, filtering rules for preprocessing are enabled as options.

After filtering, system call traces are sent to the analysis machine. Consider-ing accumulative data may cause bigger latency on data transfer and analysis,we set a parameter called time window to tune the frequency of sending systemcall logs. It is the periodic time span during which system calls are logged.

3.3 SODG Generation and Concatenation

System calls from individual hosts are used to construct per-host SODGs. Aper-host SODG can be constructed by first parsing system calls into OS objects(process/file/socket) and dependency relations between them. OS objects thenbecome SODG nodes and dependency relations become SODG edges. Depen-dency rules are proposed and used in related works [23–25] to help determinedependency relation types according to specific system calls. Table 1 lists thedependency rules used in Patrol. In addition to dependency rules, system callarguments also contribute to the parsing. They are used to uniquely recognizeand name SODG nodes, and help infer the edge direction between them. Forexample, system call “sys open, start:470880, end:494338, pid:6707, pname:scp,pathname:/mnt/trojan, inode:9453574 ” from our trace is transformed to (6707,scp)←(/mnt/trojan, 9453574 ), where pid and pname are used to recognize theprocess, and pathname and inode are used to identify the file.

Hosts communicate with each other, hence a per-host SODG may have di-rected edges to or from other per-host SODGs. This insight can be leveraged tobuild the network-wide SODG by concatenating per-host SODGs. If and onlyif there exists at least one directed edge between two nodes from two differentper-host SODGs, these two SODGs can be concatenated together. Such edgescan serve as the glue for concatenation. We find that directed edges betweenper-host SODGs are usually caused by socket-based communications. A local

8 Jun Dai, Xiaoyan Sun, and Peng Liu

program can communicate with a remote program through message passing,which can be captured by system call socketcall. Hence, two per-host SODGs canbe concatenated together by identifying and pairing socket objects. For exam-ple, system call “sys accept, start:681154, end:681162, pid:4935, pname:sshd, sr-caddr:172.18.34.10, srcport:36036, sinkaddr:192.168.101.5, sinkport:22 ” resultsin a directed edge (172.18.34.10, 36036 )→(192.168.101.5, 22 ), where a socketobject is denoted as a tuple (ip, port). This edge can be used to concatenate theper-host SODGs of 172.18.34.10 and 192.168.101.5. The network-wide SODGis constructed by recursively concatenating the per-host SODGs. First, two per-host SODGs can be concatenated into a 2-host SODG. Then, the 3rd per-hostSODG can be glued to the 2-host SODG, the 4th per-host SODG glued to the3-host SODG, and so on. The algorithm goes on recursively and ends when noedge exists between any per-host SODG and the resulted network-wide SODG.

3.4 SIPPs Identification

SIPPs identification is designed to dig out SIPPs from the network-wide SODG.A benefit of the network-wide SODG is that intra-host forward and backwarddependency tracking can be extended across the boundaries of individual hosts.Using trigger nodes as seeds, such inter-host dependency tracking identifies allnetwork SODG objects that have direct or transitive dependency relations to orfrom trigger nodes, i.e. SIPPs by Definition 3. Hence, the SIPPs identificationbegins with the recognition of trigger nodes. Trigger nodes could be files thatare deleted, added, or modified in unexpected ways, and processes that behavein an unusual or malicious manner, such as conducting abnormal port scanning,or making disallowed system calls. They are usually raised by security sensorslike Snort, Tripwire, etc., and noticed by administrators.

Trigger nodes are not necessarily the start of an intrusion. For example,what an IDS detects could be later manifestation of the start. In that case,Patrol will use trigger nodes to first perform backward tracking to find theintrusion start, and then use the start to perform forward tracking. Basically,backward dependency tracking is used to identify all the SODG objects thathave directly or transitively affected trigger nodes, and forward tracking is toidentify objects that have been affected by trigger nodes. In patrol, backward andforward dependency tracking are both implemented based on breadth-first search(BFS) algorithm [26], as depicted in Definition 3. In simple words, the SIPPsis initialized to include only trigger nodes, and then BFS is recursively invokedto add new nodes and edges from the network-wide SODG. For each objectobj′ in SIPPs, the latest and earliest access time are respectively maintained inlat(obj′) and eat(obj′). In backward tracking, if obj′ depends on another objectobj in SODG, and the timestamp start of this dependency relation is earlierthan lat(obj′), it means that obj has affected obj′. So, obj and the dependencyrelation should be added into SIPPs. Similarly, in forward tracking, if anotherobject obj in SODG depends on obj′, and the timestamp end of this dependencyrelation is later than eat(obj′), it means that obj has been affected by obj′ andshould be added into SIPPs together with the dependency relation.

Patrol 9

3.5 Shadow Indicator Checking

The SIPPs could still be complex. To further identify highly suspicious candidatezero-day attack paths among the SIPPs, we propose the concepts of vulnerabilityshadow and shadow indicator. These concepts are based on the observation thatvulnerabilities share some features. CWE [27] enumerates 693 common weak-nesses, and CAPEC [28] classifies 400 common attack patterns. These commonfeatures could exist in vulnerabilities found in a long time span, and even insome future unknown vulnerabilities.

The concept of vulnerability shadow is much in the same spirit. But instead ofdirectly characterizing vulnerabilities, we propose to characterize exploitationsof them at the OS level. This is because, due to the existence of shared fea-tures, exploitations of some vulnerabilities often result in similar characteristicsin SODG. The insight here is that, the characteristics extracted from previousexploitations of known vulnerabilities can be applied to detect the exploitationof unknown vulnerabilities. We leverage this insight as follows: we define suchcommon characteristics as an indicator function, which is used to indicate mem-bership of elements in set theory, and use this function to build a set. Theresulted set is a set of known and unknown vulnerabilities, whose exploitationsall have the common characteristics. Such a set is named vulnerability shadow,and its set indicator function is called shadow indicator.

Definition 4. Vulnerability Shadow and Shadow IndicatorA vulnerability shadow is a Cantor set denoted as S ={v |p(SODG(v))}, where:– v is a known or unknown vulnerability, whose exploitation is part of the

SODG represented as SODG(v);– p, the shadow indicator for S, is a boolean-valued set indicator function:

SODG(v)→{true, false}. p can be a conjunction of several predicates, in aform like p=p1&p2&· · ·&pn (n is a natural number), where for ∀1 ≤i≤ n, piis predicating an attribute of a node or edge in SODG(v), and & stands forAND operation in logic (p is true, iff pi is true for ∀1 ≤i≤ n);

– v∈S, iff p(SODG(v))=true.

Fig. 4 shows an example vulnerability shadow bypassing mmap min addr,with node.name=page zero&node.indegree>0 &node.outdegree>0 as its shadowindicator.2 This indicator was first observed in exploiting CVE-2009-1895 andCVE-2009-1897, and then can be used to recognize the exploitations of CVE-2009-2692, CVE-2009-2695, CVE-2009-2698, etc. A very intriguing implicationof vulnerability shadow is that, unknown vulnerabilities that do not have a CVEID yet could exist in this shadow, if and only if their exploitations can make theshadow indicator become true.

Shadow indicators imply occurrence of an exploitation and should not appearin legitimate paths. In addition to the trigger node, if other shadow indicatorsappear on a path in SIPPs, the path is very likely to be an attack path. If

2The kernel variable mmap min addr is tunable to specify the minimum virtual address that aprocess is allowed to mmap. Bypassing mmap min addr makes a violation to map user-landpage zero, which can be triggered later by null pointer dereference to gain privileges. Page zero isparsed from mmap2(null, 4096, ∗, ∗, ∗)=0 or mprotect(0, 4096, ∗)=0, where ∗ is the wildcard.

10 Jun Dai, Xiaoyan Sun, and Peng Liu

shadow indicator:

node.name=page zero&

node.indegree>0&node.outdegree>0

CVE-2009-1897CVE-2009-1895 CVE-2009-2698 CVE-2009-2695 CVE-2010-4346

unknown vulnerabilities... ...CVE-2009-2692

Fig. 4: A vulnerability shadow example: bypassing mmap min addr.

no alerts from vulnerability scanners or traditional IDS can be associated withany of these indicators, this path is reported as a highly suspicious candidatezero-day attack path. Rule-based checking is employed to recognize the shadowindicators in SIPPs. As Snort rules are developed for Snort to capture attacksignature at packet level, Patrol rules are invented for Patrol to capture shadowindicators at OS level. A Patrol rule is like this: indicator indicator object (func-tion: indicator function; msg: “vulnerability shadow name”).

Each rule specifies the object to check upon in indicator object. If no object isspecified, “any” is used to check on every object. Each rule contains the indicatorfunction in indicator function. The function specifies unexpected attribute valuesof the nodes or edges in SIPPs. A message will display the name of the vulnerabil-ity shadow when the function returns true. The following gives the Patrol rule forchecking the shadow indicator of bypsssing mmap min addr: indicator page zero(function: indegree>0 &outdegree>0; msg: “bypassing mmap min addr”).

The attributes used to specify indicator function include graph attributesand system call attributes. The graph attributes like indegree (a node’s inwardedge number) and outdegree (outward edge number) allow us to characterizeexploitations from the perspective of graph. In addition to graph attributes, sys-tem call attributes such as syscall (system call name), argument (arguments) andrtn (return value) can also be taken into consideration. Patrol maintains associ-ation between graph edges and corresponding system calls. Hence, system callscan be revisited for inspection of its arguments and return values. For example,the following Patrol rule is used to detect symlink inconsistency: indicator any(function: outdegree=0 &∃(syscall=linkat&rtn=0 ); msg: “symlink inconsistencybetween request and creation”).3

4 Implementation

The system design is implemented into a prototype named Patrol, through ap-proximately 5493 lines of code, which include about 2411 lines of C code for aloadable kernel module auditing 39 system calls, and 3082 lines of gawk code fordata analysis which produces dot-compatible [29] output for graph visualization.

System Call Auditing and OS-aware Reconstruction. Patrol hooks sys-tem calls via a loadable kernel module, which can audit all running processes.Interested system calls are audited, including those encapsulated in system callsocketcall, such as sys accept, sys sendto, etc. In the module, codes are insertedto each system call to 1) record its arguments and return values; 2) refer OS

3If a symbolic link created is inconsistent with the one requested, an attacker can exploit racecondition to make arbitrary code executed as the requested link is referenced. Because linkat hasother alternatives like symlinkat, link, and symlink, this rule has several siblings.

Patrol 11

kernel data structures, retrieving process descriptor from task struct and file de-scriptor from files struct. The OS-aware information such as process descriptors,absolute file paths and inode numbers are preserved for accurate OS object iden-tification. The timestamps start and end respectively record the time that thesystem call is invoked and returned. The resulted kernel module supports Linuxkernel versions 2.6.24 through 2.6.32.

Graph Representation and Edge Aggregation. We represent our graphswith an adjacency matrix (Map) because during SODG generation and SIPPsidentification we need to quickly look up if there is already an existing edgeconnecting two nodes. With adjacency matrix, the query takes only O(1) time,while with other data structures it may take O(|v|) or O(|e|) time, where |v|and |e| are respectively the number of nodes and edges in a graph. For eachpair of SODG nodes (srcObj and sinkObj ), there could be a large number ofedges between them. The edges are caused by different system calls or the samesystem call with different timestamps. Our implementation aggregates them intoa single one, maintaining the matrix cell (Map[srcObj, sinkObj ]) to count thenumber of edges, and a timestamp list (tMap[srcObj, sinkObj ]) to associate thisaggregated edge with different timestamps.

Light Mode and Heavy Mode. To reduce dependency on efficiency of thetraditional security sensors, Patrol implements another mode: heavy mode, inwhich Patrol feeds itself with its own alerts as seeds. In light mode, Patrol getsfed with trigger nodes, identifies SIPPs, and continues with rule-based checkingagainst SIPPs to detect if shadow indicators exist. In heavy mode, it doesn’t useany trigger nodes from other tools. Instead, it directly matches shadow indicatorsagainst the whole network-wide SODG. If any shadow indicators are matched,they are then used as trigger nodes to initiate the light-mode running. That is, aheavy mode can be run to replace the role of security sensors, but it also causesheavier workload. For example, the heavy mode can detect the brute-force attackexploiting CVE-2008-0166 in seconds after the SODG is built, without relyingon any Snort alert. This paper focuses on illustration of light mode.

5 Evaluation

5.1 Experimental Setup

The ideal environment to evaluate Patrol is a real-world enterprise network. How-ever, accesses to production kernels are tightly controlled by policy. We thereforebuilt a web-shop test-bed for evaluation. Fig. 1 illustrates the test-bed network,which is set up with firewalls, Nessus [30], Oval [31], Snort, Wireshark [32],Ntop [33] and Tripwire. The hosts are typically deployed with Dell PowerEdgeT310 with two 2.53GHz Intel(R) Xeon(R) X3440 quad-core processor and 4GBof RAM running 32-bit Linux 2.6.24 through 2.6.32.

We implemented the attack scenario in Fig. 1. In order to produce zero-dayattack paths, the attacks have to exploit unknown vulnerabilities. However, atypical zero-day attack can remain undisclosed for 312 days on average [34]. Dueto such lack of zero-day resources, we emulate unknown vulnerabilities by usingpublished vulnerabilities. Our strategy is to tune the “time” back to a history

12 Jun Dai, Xiaoyan Sun, and Peng Liu

Step 1: brute-force attack to SSH server.shadow indicator: brute-force attack

Step 2: trojan-horse file uploaded to /exports on NFS Server.shadow indicator: illegal file write access

Step 3: page-zero triggered by null pointer dereference to gain privilege on Workstation 1.shadow indicator: bypassing mmap_min_addr

Fig. 5: The zero-day attack path p1 dug out from the SIPPs (Fig. 2b) by Patrol, capturing the 3-stepattack in the attack scenario. The identified shadow indictors are highlighted in red color. The greynodes are proved to be malicious during verification.

date and assume vulnerabilities published after that date are still unknown.Such emulation enables us to evaluate the correctness of our approach, because1) timelines can be maintained for vulnerability shadows to make sure that nospecific knowledge of the emulated vulnerabilities is needed; 2) the exploit codeand other information about the emulated vulnerabilities can be available forverification. This paper assumes that the time is tuned to August 1, 2009, so thatCVE-2008-0166 becomes the only known vulnerability in the attack scenario.

5.2 Correctness

Of all the vulnerabilities in the attack scenario, only the exploit of CVE-2008-0166 triggered an alert “SSH potential brute force attack” from Snort. Hence,both of the zero-day attack paths p1 and p2 in the attack scenario were missing.In contrast, using the SSH socket (node 225 in the figures) noticed from the Snortalert as the trigger node, Patrol successfully identified both p1 and p2 at theOS level. Fig. 5 and Fig. 7 respectively illustrate p1 4 and p2. Since p2 and p1share the same Step 1 and Step 2, Fig. 7 only shows the Step 3 of p2.

-2

-1

0

1

2

3

4

5

6

7

8

25 50 75 100 125 150 175 200 225 250 275 300 325 350 375 400 425

# o

f fa

lse

ne

gati

ves

#

of

fals

e p

osi

tive

s

brute-force threshold (in-degrees/minute)

1 request/6 seconds 1 request/5 seconds 1 request/4 seconds

1 request/3 seconds 1 request/2 seconds 1 request/1 seconds

Fig. 6: False positives and negatives of shadow indicatorchecking for brute-force attack.

We verified the correctness ofp1 and p2, by comparing thenodes and edges on them withthe intrusion knowledge extractedfrom the exploit code, the CVEentries in NVD [35] and the doc-umentation of corresponding vul-nerable applications. We markedthe nodes in Fig. 5 and Fig. 7 withgrey color if they were verified tobe malicious. It shows that Patrol correctly captured the malicious objects in-teracting with each other to accomplish the intrusion break-in and propagation.

4There were hundreds of socket communications coming from different ports of the same maliciousIP (192.168.202.2) to node 225. For simplicity, only three of them are illustrated.

Patrol 13

Step 3: symlink inconsistency exploited to win race condition on Workstation 2

shadow indicator: symlink inconsistency between request and creation

Fig. 7: Step 3 of the zero-day attack path p2 identifiedby Patrol. The red and greendotted lines respectively de-note the execution of the at-tack processes and innocentprocesses. The red lines re-placed the requested symlink/tmp/ls (79) with maliciouscode /tmp/evil (78), whichwas later referenced by thethe innocent process ls (115).The identified shadow indic-tor is highlighted in red color.The grey nodes are proved tobe malicious during verifica-tion.

We also evaluated the false positives of the shadow indicator checking on thetwo identified paths. For this, we kept Patrol running intensively for 72 hoursagainst a variety of applications and services in the test-bed. It turns out that thefalse positive rate of shadow indicator checking is indicator-specific. For example,the indicator checking for bypassing mmap min addr and symlink inconsistencygot 0 false positives, while the indicator checking for brute-force attack hadfalse positives varying with the setup of a parameter and the workload of thehost. The brute-force shadow indicator (node.indegree>thresholdbruteforce) usesthresholdbruteforce to specify the maximum in-degree per minute allowed for aSODG node. Fig. 6 illustrates the impact of thresholdbruteforce on false positivesand negatives for SSH Server. As the threshold increases, the false positives firstdecrease and then stay at 0 until the false negative appears. As the request speedincreases, the false positives increase and a bigger threshold is needed.

Furthermore, the above false positives can be tolerated by Patrol to someextent. For example, for brute-force shadow indicator checking, the false alarmedobjects include: 1) DNS related process (avahi-daemon) or sockets (port 53 or5353); 2) uninitialized sockets (port 0); 3) dynamic linked library files. However,none of them were on the same SIPPs with other shadow indicators. Hence, withthe help of SIPPs, most of the false positives could be eliminated.

5.3 Efficiency

Time window size and filtering preprocessing are two important factors impact-ing the efficiency of Patrol data analysis. Time window is the periodic time spanduring which system calls are collected and analyzed. All the evaluation resultsin this subsection use the arithmetic mean averaging over 10 runs of tests.

Impact of Time Window Size. We set the time window size to values from5 mins to 55 mins. Table 2 illustrates the statistics of Patrol data analysis forSSH server. To get overhead under heavy workload, requests were loaded to SSH

14 Jun Dai, Xiaoyan Sun, and Peng Liu

Table 2: Statistics for time window based tests on data analysis.time window size (mins) 5 15 25 35 45 55# of syscalls in filtered log 17550 52649 87748 122848 157947 193047time overhead of SODG generation (s) 44.94 108.88 278.52 601.93 1097.33 1836.47# of objects in SODG 526 1425 2326 3227 4101 4977time overhead of SIPPs identification (s) 0.91 7.54 22.75 48.79 76.75 107.02# of objects on SIPPs 374 1094 1811 2519 3209 3903time overhead of indicator checking (s) 0.004 7.033 18.149 31.159 60.932 76.497total overhead (s) 52.26 142.30 350.90 726.58 1291.95 2089.31syscall generation speed (KB/s) 1.02 1.027 1.034 1.033 1.032 1.034data analysis speed (KB/s) 5.839 6.498 4.418 2.985 2.157 1.634storage size (raw)(MB) 2.731 8.189 13.65 19.107 24.568 30.026storage size (compressed)(MB) 0.298 0.903 1.514 2.118 2.722 3.333

Server at the speed of 1 request per 5 seconds. Data analysis spends time mainlyon SODG generation, SIPPs identification and shadow indicator checking. Fig. 8plots the time overheads. The results show that SODG generation dominates thetime overhead, and its computation cost increases approximately quadratic withthe time window size. The time overheads of SIPPs identification and shadowindicator checking tend to be linear and relatively much smaller. Fig. 9 showsthat the speed of Patrol data analysis is maximized when time window size is 15mins. This speed is far beyond the system call generation. We also noticed thatthe caused latency is about 2.37 mins, and the storage requirement is about 0.085GB/day. Today’s hard disk is large enough to accommodate this substantialamount of log traffic. Considering the test is done in quite request-intensiveworkload, both the time and storage overheads are reasonable. We thereforedetermine the time window size for the test-bed network to be 15 mins.

0

500

1000

1500

2000

2500

5 15 25 35 45 55

tim

e o

verh

ead

(in

se

con

ds)

time window size (in minutes)

SODG generation time

SIPPs identification time

shadow indicatorchecking time

total time

Fig. 8: Time overhead of Patrol data analysisvarying with time window size.

0

1

2

3

4

5

6

7

5 15 25 35 45 55

spe

ed

(K

B/s

eco

nd

)

time window size (in minutes)

syscall generation speed

data analysis speed

Fig. 9: Patrol data analysis speed vs. system callgeneration speed.

The above results are theoretically supported. SODG generation checks eachexisting object to avoid duplication before adding new objects. Hence, the com-putational complexity of SODG generation can be O(|v|2). The SIPPs identifi-cation is using the BFS algorithm, thus its time complexity is O(|v| + |e|) [26],where |v| and |e| are respectively the number of nodes and edges in SODG.The shadow indicator checking checks each object and dependency of SIPPs inworst case, therefore its complexity is also O(|v′| + |e′|), where |v′| and |e′| arerespectively the number of nodes and edges in SIPPs.

Impact of Filtering Preprocessing. Table 3 summarizes the SODG genera-tion time with filtering enabled and disabled respectively. The results show thatunfiltered data costs more time than filtered data. The worst case overhead isthe unfiltered SODG generation for SSH Server. It spent about half an hour.The large overhead is mainly because the algorithm checks each existing objectto avoid duplication before adding new objects. When the system object numberreaches very high, such as 15960 in this case, the time cost rises very quickly.We also noticed that among these objects, the number of files is extremely large

Patrol 15

Table 3: Comparison results between filtered and unfiltered data analysis.SSH Server NFS Server Workstation 1

filtered/unfiltered filtered unfiltered filtered unfiltered filtered unfiltered# of syscalls in log 22249 82133 11761 14944 21722 46043time overhead on SODG(s) 58.38 1812.966 42.286 48.447 51.012 101.138# of objects 650 15960 34 210 604 1007# of processes 230 273 7 121 106 138# of files 248 15515 17 79 473 844# of sockets 171 171 10 10 23 23# of dependencies 18697 97805 11813 15056 19649 43712

as 15515. The filtered SODG generation costs less than one minute because alarge number of these files are effectively pruned by filtering rules.

5.4 Performance Overhead

We use LMBench [36] to measure the performance impact of Patrol on individualcore kernel system calls. The outputs show that the addon overhead of mostmodified system calls in Patrol is within 10%. Some of them are even workingwith negligible overhead, such as sys read and sys write. The worst case overheadis 52.7% for sys stat and 175% for sys fstat. These results are to be expected,because of the relatively small amount of work done in each call compared tothe work of recording OS-aware object information. For example, 175% is largerthan 52.7% because of the smaller denominator, but in both cases the imposedoverhead was equally 0.3-0.4 microseconds. The common case is much better.

We use UnixBench to measure the slow-down of the whole system that or-chestrates the above individual system calls together. The outputs show thatthe performance overhead of Patrol is 20.8% for the whole system, with largeroverhead to I/O-intensive applications than CPU-intensive applications. We alsouse kernel decompression and kernel compilation to measure the system perfor-mance of Patrol in intensive workload. The results show that the two workloadsimpose 15.93% overhead and 20.34% overhead on the system.

5.5 Scalability

Regarding the scalability, let’s consider the main overhead imposed on band-width, SODG generation and SIPPs identification for an enterprise networkequipped with 10000 hosts, 10 GB/s network bandwidth and a HPC clusterof 640 processor cores (20 processors with 32 cores per processor).

With converging traffic from hosts to the cluster, the bandwidth cost will beabout 10000 times the system call generation speed for each host. Taking thespeed 1.027 KB/s from Table 2, the bandwidth overhead is about 10.029 MB/swhich only occupies less than 1% of total bandwidth.

The SODG generation costs time mainly on per-host SODG generation whichis a parallelizable task (α=0 in Equation 1). Given the data collected in 1 timewindow, the SODG generation time for 10000 hosts is estimated to be 28.35minutes according to the following Gustafson’s law, taking single-host SODGgeneration overhead as 108.88 seconds from Table 2.

t1tp

= p− α(p− 1) = α+ p(1− α) (1)

where p is the number of processors for parallel computing, α is the fractionof running time a program spends on non-parallelizable parts, t1 is the executiontime of the sequential algorithm, and tp is the execution time with maximumspeed-up under parallelization of the program.

16 Jun Dai, Xiaoyan Sun, and Peng Liu

SIPPs identification from a trigger node is non-parallelizable (α=1) due tothe sequential nature of dependency tracking. Hence, the SIPPs identificationtime increases linearly with the host-length of SIPPs (l). Its maximum can beestimated by constructing service dependency transitive closure (“host A canreach host B through one or more service dependencies”) in enterprise network.Let’s suppose l=100, and the SIPPs identification time will be about 12.57 min-utes, taking time overhead of single-host SIPPs identification as 7.54 secondsfrom Table 2. SIPPs identification from different trigger nodes and branching inSIPPs identification can be done in parallel. As long as the number of triggernodes and branches don’t exceed p, SIPPs identification can be easily handledwithin 12.57 minutes. We make conservative estimation by α=1, hence the effi-ciency for parallel computing can be better in reality than estimated.

6 Related Work

Patrol draws inspirations from previous research such as system call-based in-trusion detection and system object dependency tracking.

System calls are used in pioneer works by Forrest et al. [11] and Lee etal. [12] for intrusion detection. System call-based IDS mainly leverages statisticalproperties of system call sequence [13] [14] and system call arguments [16] [17].Bhatkar et al. further takes into account the temporal properties involving ar-guments of different system calls [18]. Instead of providing individual intrusionalerts, the aim of Patrol is to identify zero-day attack paths through network-wide dependencies parsed from system calls. These paths provide network-wideattack context, and help detect unknown vulnerability exploitations.

System object dependency tracking is first proposed by King et al. [23] toautomatically identify sequences of intrusion steps. The follow-up works [37] [38]further propose to integrate system object dependency tracking and alert correla-tion techniques. Given a large number of existing IDS alerts, these works targeton identifying their correlations. In contrast, Patrol takes an inverse strategyto first identify SIPPs hidden in the network-wide SODG, and then recognizeunknown vulnerability exploitations on these paths.

7 Discussion and Conclusion

In addition to the promising potentials, the current version of Patrol may facechallenges such as 1) If an attack path goes through a victim machine hostingkernel mode service like nfs-kernel-server, Patrol may lose trace halfway since itrelies on system call interface; 2) If an attack is a long-term attack, Patrol maysuccessfully capture its intrusion propagation paths at different time spans, butfail to correlate them.

In conclusion, this paper identifies the problem of zero-day attack paths inpractical network defense. This paper proposes a prototype system named Pa-trol. By building a network-wide system object dependency graph, identifyingsuspicious intrusion propagation paths in it, and recognizing shadow indicatorson these paths, Patrol can dig out the zero-day attack paths at runtime.

Patrol 17

Acknowledgments

We want to thank the anonymous reviewers for their valuable and helpful com-ments. This work was supported by ARO W911NF-09-1-0525 (MURI), NSFCNS-0905131, AFOSR W911NF1210055, and ARO MURI project “Adversarialand Uncertain Reasoning for Adaptive Cyber Defense: Building the ScientificFoundation”.

References

1. O. Sheyner, J. Haines, S. Jha. Automated generation and analysis of attack graphs.In IEEE Oakland, 2002.

2. S. Jajodia, S. Noel, and B. OBerry. Topological analysis of network attack vulner-ability. In Managing Cyber Threats: Issues, Approaches and Challanges, 2003.

3. X. Ou, S. Govindavajhala, A. W. Appel. MulVAL: A logic-based network securityanalyzer. In USENIX Security, 2005.

4. L. Wang, S. Jajodia, A. Singhal, P. Cheng, S. Noel. k-Zero day safety: A networksecurity metric for measuring the risk of unknown vulnerabilities. In TDSC, 2013.

5. M. Albanese, S. Jajodia, A. Singhal, L. Wang. An efficient approach to assessingthe risk of zero-day vulnerabilities. In SECRYPT, 2013.

6. J. Long. Google Hacking for Penetration Testers. Syngress, 2007.7. S. McClure. Hacking Exposed: Network Security Secrets and Solutions. McGraw-

Hill, 2009.8. Network Penetration Testing. MosaicSecurity.com.

https://mosaicsecurity.com/categories.9. H. Debar, A. Wespi. Aggregation and correlation of intrusion-detection alerts. In

RAID, 2001.10. A. Valdes, K. Skinner. Probabilistic alert correlation. In RAID, 2001.11. S. Forrest, S. A. Hofmeyr, A. Somayaji, T. A. Longstaff. A sense of self for unix

processes. In IEEE Oakland, 1996.12. W. Lee, S. J. Stolfo, P. K. Chan. Learning patterns from unix process execution

traces for intrusion detection. In AI Approaches to Fraud Detection and RiskManagement, 1997.

13. A. P. Kosoresow, S. A. Hofmeyer. Intrusion detection via system call traces. InIEEE Software, 1997.

14. S. A. Hofmeyr, S. Forrest, A. Somayaji. Intrusion detection using sequences ofsystem calls. In Journal of Computer Security, 1998.

15. D. Wagner, D. Dean. Intrusion Detection via Static Analysis. In IEEE Oakland,2001.

16. C. Kruegel, D. Mutz, F. Valeur, G. Vigna. On the detection of anomalous systemcall arguments. In ESORICS, 2003.

17. G. Tandon, P. Chan. Learning rules from system call arguments and sequences foranomaly detection. In ICDM DMSEC, 2003.

18. S. Bhatkar, A. Chaturvedi, R. Sekar. Dataflow anomaly detection. In IEEE Oak-land, 2006.

19. R. Sekar, A. Gupta, J. Frullo, T. Shanbhag. Specification-based Anomaly Detec-tion: A New Approach for Detecting Network Intrusions. In ACM CCS, 2002.

20. C. Ko, M. Ruschitzka, K. Levitt. Execution Monitoring of Security-Critical Pro-grams in Distributed Systems: A Specification-Based Approach. In IEEE Oakland,1997.

18 Jun Dai, Xiaoyan Sun, and Peng Liu

21. Snort. Sourcefire, Inc. http://www.snort.org.22. Tripwire. Tripwire, Inc. http://www.tripwire.com.23. S. T. King, P. M. Chen. Backtracking intrusions. In ACM SOSP, 2003.24. X. Xiong, X. Jia, P. Liu. Shelf: Preserving business continuity and availability in

an intrusion recovery system. In ACSAC, 2009.25. A. Goel, K. Po, K. Farhadi, Z. Li, E. de Lara. The taser intrusion recovery system.

In ACM SOSP, 2005.26. D. E. Knuth. The Art Of Computer Programming, 1997.27. CWE. MITRE. http://cwe.mitre.org.28. CAPEC. MITRE. http://capec.mitre.org.29. Graphviz. http://www.graphviz.org.30. Nessus. Tenable Network Security. http://www.tenable.com.31. Oval. MITRE. http://oval.mitre.org.32. Wireshark. Wireshark Foundation. http://www.wireshark.org.33. Ntop. http://www.ntop.org.34. L. Bilge, T. Dumitras. An Empirical Study of Zero-Day Attacks In The Real

World. In ACM CCS, 2012.35. NVD. MITRE. http://nvd.nist.gov.36. L. W. McVoy, C. Staelin. lmbench: Portable Tools for Performance Analysis. In

USENIX, 1996.37. S. T. King, Z. M. Mao, D. G. Lucchetti, P. M. Chen. Enriching intrusion alerts

through multi-host causality. In NDSS, 2005.38. Y. Zhai, P. Ning, J. Xu. Integrating IDS alert correlation and OS-Level dependency

tracking. In IEEE Intelligence and Security Informatics, 2006.

Appendix

Table 4: Statistics for the 3-host SODG and SIPPs in Fig 2.metrics SSH Server NFS Server Workstation 1

time window size (in minutes) 15 15 15

# of syscalls in unfiltered log 82133 14944 46043

# of syscalls in filtered log 22249 11761 21722

growth rate of compressed syscall log (GB/day) 0.126 0.019 0.065

# of objects in graph 650 34 604

# of processes in graph 230 7 106

# of files in graph 248 17 473

# of sockets in graph 171 10 23

# of dependencies in graph 18697 11813 19649

# of inter-host dependencies from last host in graph 50 11 1

# of inter-host dependencies to next host in graph 1 11 0

average indegree/outdegree in graph 29 347 33

max indegree in graph 8640 8478 12909

object index of max indegree in graph 543 661 1123

max outdegree in graph 9908 8294 12784

object index of max outdegree in graph 225 663 1153

# of objects in SIPPs 26 6 143

# of processes in SIPPs 8 1 62

# of files in SIPPs 3 2 75

# of sockets in SIPPs 15 3 5

# of dependencies in SIPPs 8905 11664 4059

# of inter-host dependencies from last host in SIPPs 14 1 1

# of inter-host dependencies to next host in SIPPs 1 8 0

average indegree/outdegree in SIPPs 343 1944 28

max indegree in SIPPs 8581 8442 410

object index of max indegree in SIPPs 543 661 808

max outdegree in SIPPs 8686 8280 2373

object index of max outdegree in SIPPs 225 663 783