首页> 外文会议>Digital Society, 2010. ICDS '10 >Detecting Return-to-libc Buffer Overflow Attacks Using Network Intrusion Detection Systems
【24h】

Detecting Return-to-libc Buffer Overflow Attacks Using Network Intrusion Detection Systems

机译:使用网络入侵检测系统检测返回libc的缓冲区溢出攻击

获取原文

摘要

There has been a significant amount of research recently into methods of protecting systems from buffer overflow attacks by detecting stack injected shell code. The majority of the research focuses on developing algorithms or signatures for detecting polymorphic and metamorphic payloads. However much of this problem has already been solved through the mainstream use of host based protection mechanisms e.g. Data Execution Prevention (DEP) and Address Space Randomization (ASLR). Many hackers are now using the more inventive attack methods e.g., return-to-libc, which do not inject shell code onto the stack and thus evade DEP and common shell code detection mechanisms. The purpose of this work is to propose a series of generic signatures that could be used to detect network born return-to-libc attacks. To this end we outline how we performed a return-to-libc network based attack, which bypasses DEP and common IDS signatures, before suggesting an efficient signature for detection of similar return-to-libc attacks.
机译:最近,通过检测堆栈注入的外壳代码,对保护系统免受缓冲区溢出攻击的方法进行了大量研究。大多数研究集中在开发用于检测多态和变质有效载荷的算法或签名。但是,通过基于主机的保护机制(例如,基于主机的保护机制)的主流使用,已经解决了许多这个问题。数据执行保护(DEP)和地址空间随机化(ASLR)。现在,许多黑客正在使用更具创新性的攻击方法,例如Return-libc,该方法不会将外壳程序代码注入堆栈中,从而逃避了DEP和常见的外壳程序代码检测机制。这项工作的目的是提出一系列通用签名,这些签名可以用于检测网络生成的libc攻击。为此,我们概述了在建议有效的签名来检测类似的“返回libc”攻击之前,如何绕过DEP和通用IDS签名执行基于“返回libc”网络的攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号