Evasion Techniques: Sneaking through Your Intrusion Detection/Prevention Systems

被引:49
作者
Cheng, Tsung-Huan [1 ]
Lin, Ying-Dar [1 ]
Lai, Yuan-Cheng [2 ]
Lin, Po-Ching [3 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp Sci, Hsinchu 300, Taiwan
[2] Natl Taiwan Univ Sci & Technol, Dept Informat Management, Taipei 106, Taiwan
[3] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiayi 621, Taiwan
关键词
IDS/IPS; evasion; attacks; signature; SECURITY;
D O I
10.1109/SURV.2011.092311.00082
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Detecting attacks disguised by evasion techniques is a challenge for signature-based Intrusion Detection Systems (IDSs) and Intrusion Prevention Systems (IPSs). This study examines five common evasion techniques to determine their ability to evade recent systems. The denial-of-service (DoS) attack attempts to disable a system by exhausting its resources. Packet splitting tries to chop data into small packets, so that a system may not completely reassemble the packets for signature matching. Duplicate insertion can mislead a system if the system and the target host discard different TCP/IP packets with a duplicate offset or sequence. Payload mutation fools a system with a mutative payload. Shellcode mutation transforms an attacker's shellcode to escape signature detection. This study assesses the effectiveness of these techniques on three recent signature-based systems, and among them, explains why Snort can be evaded. The results indicate that duplicate insertion becomes less effective on recent systems, but packet splitting, payload mutation and shellcode mutation can be still effective against them.
引用
收藏
页码:1011 / 1020
页数:10
相关论文
共 39 条
[1]  
[Anonymous], METASPLOIT ENCODING
[2]   Counting Bloom Filters for Pattern Matching and Anti-Evasion at the Wire Speed [J].
Antichi, Gianni ;
Ficara, Domenico ;
Giordano, Stefano ;
Procissi, Gregorio ;
Vitucci, Fabio .
IEEE NETWORK, 2009, 23 (01) :30-35
[3]  
Bania P., 2009, EVADING NETWORK LEVE
[4]  
Bidou R., 2006, BLACK HAT BRIEFINGS
[5]  
Borders K., 2007, P ANN COMP SEC APPL
[6]   Network intrusion detection - Automated and manual methods prone to attack and evasion [J].
Chaboya, David J. ;
Raines, Richard A. ;
Baldwin, Rusty O. ;
Mullins, Barry E. .
IEEE SECURITY & PRIVACY, 2006, 4 (06) :36-43
[7]  
Chung S. P., 2008, P 11 INT S REC ADV I
[8]  
Debar H., 2002, P REC ADV INTR DET R
[9]  
Detristan Theo., 2003, PHRACK, V11
[10]  
Dharmapurikar S., 2005, P USENIX SEC S AUG