Technically, AgentSmith-HIDS is not a Host-based Intrusion Detection System (HIDS) due to lack of rule engine and detection function. However, it can be used as a high performance ‘Host Information Collect Agent’ as part of your own HIDS solution.
The comprehensiveness of information which can be collected by this agent was one of the most important metrics during developing this project, hence it was built to function in the kernel stack and achieve huge advantage comparing to those function in user stack, such as:
Also Read – Yarasafe : SAFE Embeddings To Match Functions In Yara
Major abilities of AgentSmith-HIDS:
About the compatibility with Kernel version
About the compatibility with Containers
| Source | Nodename |
|---|---|
| Host | hostname |
| Docker | container name |
| k8s | pod name |
Composition of AgentSmith-HIDS
Execve Hook
Achieved by hooking sys_execve()/sys_execveat()/compat_sys_execve()/compat_sys_execveat(), example:
{
“uid”:”0″,
“data_type”:”59″,
“run_path”:”/opt/ltp/testcases/bin/growfiles”,
“exe”:”/opt/ltp/testcases/bin/growfiles”,
“argv”:”growfiles -W gf26 -D 0 -b -i 0 -L 60 -u -B 1000b -e 1 -r 128-32768:128 -R 512-64000 -T 4 -f gfsmallio-35861 -d /tmp/ltp-Ujxl8kKsKY “,
“pid”:”35861″,
“ppid”:”35711″,
“pgid”:”35861″,
“tgid”:”35861″,
“comm”:”growfiles”,
“nodename”:”test”,
“stdin”:”/dev/pts/1″,
“stdout”:”/dev/pts/1″,
“sessionid”:”3″,
“dip”:”192.168.165.1″,
“dport”:”61726″,
“sip”:”192.168.165.128″,
“sport”:”22″,
“sa_family”:”1″,
“pid_tree”:”1(systemd)->1384(sshd)->2175(sshd)->2177(bash)->2193(fish)->35552(runltp)->35711(ltp-pan)->35861(growfiles)”,
“tty_name”:”pts1″,
“socket_process_pid”:”2175″,
“socket_process_exe”:”/usr/sbin/sshd”,
“SSH_CONNECTION”:”192.168.165.1 61726 192.168.165.128 22″,
“LD_PRELOAD”:”/root/ldpreload/test.so”,
“user”:”root”,
“time”:”1579575429143″,
“local_ip”:”192.168.165.128″,
“hostname”:”test”,
“exe_md5″:”01272152d4901fd3c2efacab5c0e38e5”,
“socket_process_exe_md5″:”686cd72b4339da33bfb6fe8fb94a301f”
}
Connect Hook
Achieved by hooking sys_connect(), example:
{
“uid”:”0″,
“data_type”:”42″,
“sa_family”:”2″,
“fd”:”4″,
“dport”:”1025″,
“dip”:”180.101.49.11″,
“exe”:”/usr/bin/ping”,
“pid”:”6294″,
“ppid”:”1941″,
“pgid”:”6294″,
“tgid”:”6294″,
“comm”:”ping”,
“nodename”:”test”,
“sip”:”192.168.165.153″,
“sport”:”45524″,
“res”:”0″,
“sessionid”:”1″,
“user”:”root”,
“time”:”1575721921240″,
“local_ip”:”192.168.165.153″,
“hostname”:”test”,
“exe_md5″:”735ae70b4ceb8707acc40bc5a3d06e04”
}
DNS Query Hook
Achieved by hooking sys_recvfrom(), example:
{
“uid”:”0″,
“data_type”:”601″,
“sa_family”:”2″,
“fd”:”4″,
“dport”:”53″,
“dip”:”192.168.165.2″,
“exe”:”/usr/bin/ping”,
“pid”:”6294″,
“ppid”:”1941″,
“pgid”:”6294″,
“tgid”:”6294″,
“comm”:”ping”,
“nodename”:”test”,
“sip”:”192.168.165.153″,
“sport”:”53178″,
“qr”:”1″,
“opcode”:”0″,
“rcode”:”0″,
“query”:”www.baidu.com”,
“sessionid”:”1″,
“user”:”root”,
“time”:”1575721921240″,
“local_ip”:”192.168.165.153″,
“hostname”:”test”,
“exe_md5″:”39c45487a85e26ce5755a893f7e88293”
}
Create File Hook
Achieved by hooking security_inode_create(), example:
{
“uid”:”0″,
“data_type”:”602″,
“exe”:”/usr/lib/jvm/java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7.x86_64/jre/bin/java”,
“file_path”:”/tmp/kafka-logs/replication-offset-checkpoint.tmp”,
“pid”:”3341″,
“ppid”:”1″,
“pgid”:”2657″,
“tgid”:”2659″,
“comm”:”kafka-scheduler”,
“nodename”:”test”,
“sessionid”:”3″,
“user”:”root”,
“time”:”1575721984257″,
“local_ip”:”192.168.165.153″,
“hostname”:”test”,
“exe_md5″:”215be70a38c3a2e14e09d637c85d5311”,
“create_file_md5″:”d41d8cd98f00b204e9800998ecf8427e”
}
Process Inject Hook
Achieved by hooking sys_ptrace(), example:
{
“uid”:”0″,
“data_type”:”101″,
“ptrace_request”:”4″,
“target_pid”:”7402″,
“addr”:”00007ffe13011ee6″,
“data”:”-a”,
“exe”:”/root/ptrace/ptrace”,
“pid”:”7401″,
“ppid”:”1941″,
“pgid”:”7401″,
“tgid”:”7401″,
“comm”:”ptrace”,
“nodename”:”test”,
“sessionid”:”1″,
“user”:”root”,
“time”:”1575722717065″,
“local_ip”:”192.168.165.153″,
“hostname”:”test”,
“exe_md5″:”863293f9fcf1af7afe5797a4b6b7aa0a”
}
Load LKM File Hook
Achieved by hooking load_module(), example:
{
“uid”:”0″,
“data_type”:”603″,
“exe”:”/usr/bin/kmod”,
“lkm_file”:”/root/ptrace/ptrace”,
“pid”:”29461″,
“ppid”:”9766″,
“pgid”:”29461″,
“tgid”:”29461″,
“comm”:”insmod”,
“nodename”:”test”,
“sessionid”:”13″,
“user”:”root”,
“time”:”1577212873791″,
“local_ip”:”192.168.165.152″,
“hostname”:”test”,
“exe_md5″:”0010433ab9105d666b044779f36d6d1e”,
“load_file_md5″:”863293f9fcf1af7afe5797a4b6b7aa0a”
}
Cred Change Hook
Achieved by Hook commit_creds(),example:
{
“uid”:”0″,
“data_type”:”604″,
“exe”:”/tmp/tt”,
“pid”:”27737″,
“ppid”:”26865″,
“pgid”:”27737″,
“tgid”:”27737″,
“comm”:”tt”,
“old_uid”:”1000″,
“nodename”:”test”,
“sessionid”:”42″,
“user”:”root”,
“time”:”1578396197131″,
“local_ip”:”192.168.165.152″,
“hostname”:”test”,
“exe_md5″:”d99a695d2dc4b5099383f30964689c55”
}
User Login Alert
{
“data_type”:”1001″,
“status”:”Failed”,
“type”:”password”,
“user_exsit”:”false”,
“user”:”sad”,
“from_ip”:”192.168.165.1″,
“port”:”63089″,
“processor”:”ssh2″,
“time”:”1578405483119″,
“local_ip”:”192.168.165.128″,
“hostname”:”localhost.localdomain”
}
PROC File Hook Alert
{
“uid”:”-1″,
“data_type”:”700″,
“module_name”:”autoipv6″,
“hidden”:”0″,
“time”:”1578384987766″,
“local_ip”:”192.168.165.152″,
“hostname”:”test”
}
Syscall Hook Alert
{
“uid”:”-1″,
“data_type”:”701″,
“module_name”:”diamorphine”,
“hidden”:”1″,
“syscall_number”:”78″,
“time”:”1578384927606″,
“local_ip”:”192.168.165.152″,
“hostname”:”test”
}
LKM Hidden Alert
{
“uid”:”-1″,
“data_type”:”702″,
“module_name”:”diamorphine”,
“hidden”:”1″,
“time”:”1578384927606″,
“local_ip”:”192.168.165.152″,
“hostname”:”test”
}
Interrupts Hook Alert
{
“uid”:”-1″,
“data_type”:”703″,
“module_name”:”syshook”,
“hidden”:”1″,
“interrupt_number”:”2″,
“time”:”1578384927606″,
“local_ip”:”192.168.165.152″,
“hostname”:”test”
}
About Performance of AgentSmith-HIDS
Testing Environment:
| CPU | Intel(R) Core(TM) i7-4870HQ CPU @ 2.50GHz 2 Core |
|---|---|
| RAM | 2GB |
| OS/Kernel | Centos7 / 3.10.0-1062.7.1.el7.x86_64 |
Testing Result:
| Hook Handler | Average Delay(us) |
|---|---|
| execve_entry_handler | 10.4 |
| connect_handler | 7.5 |
| connect_entry_handler | 0.06 |
| recvfrom_handler | 9.2 |
| recvfrom_entry_handler | 0.17 |
| fsnotify_post_handler | 0.07 |
What is a Software Supply Chain Attack? A software supply chain attack occurs when a…
When people ask how UDP works, the simplest answer is this: UDP sends data quickly…
Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…
A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…
How Does a Firewall Work Step by Step? What Is a Firewall and How Does…
People trying to securely connect to work are being tricked into doing the exact opposite.…