Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Cheng, Tsung-Huan | en_US |
dc.contributor.author | Lin, Ying-Dar | en_US |
dc.contributor.author | Lai, Yuan-Cheng | en_US |
dc.contributor.author | Lin, Po-Ching | en_US |
dc.date.accessioned | 2014-12-08T15:29:40Z | - |
dc.date.available | 2014-12-08T15:29:40Z | - |
dc.date.issued | 2012 | en_US |
dc.identifier.issn | 1553-877X | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/21310 | - |
dc.identifier.uri | http://dx.doi.org/10.1109/SURV.2011.092311.00082 | en_US |
dc.description.abstract | Detecting attacks disguised by evasion techniques is a challenge for signature-based Intrusion Detection Systems (IDSs) and Intrusion Prevention Systems (IPSs). This study examines five common evasion techniques to determine their ability to evade recent systems. The denial-of-service (DoS) attack attempts to disable a system by exhausting its resources. Packet splitting tries to chop data into small packets, so that a system may not completely reassemble the packets for signature matching. Duplicate insertion can mislead a system if the system and the target host discard different TCP/IP packets with a duplicate offset or sequence. Payload mutation fools a system with a mutative payload. Shellcode mutation transforms an attacker's shellcode to escape signature detection. This study assesses the effectiveness of these techniques on three recent signature-based systems, and among them, explains why Snort can be evaded. The results indicate that duplicate insertion becomes less effective on recent systems, but packet splitting, payload mutation and shellcode mutation can be still effective against them. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | IDS/IPS | en_US |
dc.subject | evasion | en_US |
dc.subject | attacks | en_US |
dc.subject | signature | en_US |
dc.title | Evasion Techniques: Sneaking through Your Intrusion Detection/Prevention Systems | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1109/SURV.2011.092311.00082 | en_US |
dc.identifier.journal | IEEE COMMUNICATIONS SURVEYS AND TUTORIALS | en_US |
dc.citation.volume | 14 | en_US |
dc.citation.issue | 4 | en_US |
dc.citation.spage | 1011 | en_US |
dc.citation.epage | 1020 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.identifier.wosnumber | WOS:000315392500005 | - |
dc.citation.woscount | 2 | - |
Appears in Collections: | Articles |
Files in This Item:
If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.