Investigating the evasion-resilience of Network Intrusion Detection Systems

被引:0
作者
Ytreberg, Jarle [1 ]
Papadaki, Maria [1 ]
机构
[1] Univ Plymouth, Plymouth PL4 8AA, Devon, England
来源
ECIW 2007: PROCEEDINGS OF THE 6TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY | 2007年
关键词
NIDS; evasion; snort; Nikto;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Network Intrusion Detection Systems provide an extra security precaution by detecting attacks that have bypassed the firewall. Knowledge-based intrusion detection systems rely upon rules to trigger alerts, mainly based upon the occurrence of certain keywords. However, attackers can send evading attack packets that will try to avoid detection by the IDS, and tools can be obtained to automate such attacks. A crucial question is therefore the extent to which modern IDS are resilient to evasion attempts of this type. This paper presents the results of experiments conducted using the Nikto evasion tool against the Snort IDS, with the aim of assessing Snort's alerting capabilities when mutated attack packets were sent to a web server. It was found that Snort alerted for about half of the attack packets. In addition, some weaknesses were identified in Snort's ability to detecting certain evasion attacks, which can be solved by creating customized rules. As a result of these findings, the paper also discusses a new detection method, based upon the division of large request strings into smaller ones, analyzing each of them against the rules. The total danger level of these combined strings could decide if the IDS would alert for the request.
引用
收藏
页码:327 / 334
页数:8
相关论文
共 13 条
  • [1] ANDERSON JP, 1980, COMPUTER THREAT MONI
  • [2] The evolution of intrusion detection systems - The next step
    Barber, R
    [J]. COMPUTERS & SECURITY, 2001, 20 (02) : 132 - 145
  • [3] Broucek V., 2004, INT REV LAW COMPUTER, V18, P149
  • [4] BULL J, 2002, SNORTS PLACE WINDOWS
  • [5] CHAPPLE M, 2003, EVALUATION TUNING IN
  • [6] *CIRT NET, 2006, NIKT 1 35
  • [7] GRAHAM I, 2006, ACHIEVING ZERO LOSS
  • [8] KISTLER U, 2003, SNORT IDSCENTER 1 1
  • [9] Improving intrusion detection performance using keyword selection and neural networks
    Lippmann, RP
    Cunningham, RK
    [J]. COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 2000, 34 (04): : 597 - 603
  • [10] PTACEK TH, 1998, INSERTION EVASION DE