首页> 外文会议>Computer Security Applications Conference >An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems
【24h】

An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems

机译:开发IDS刺激器的体验,用于网络入侵检测系统的黑箱测试

获取原文

摘要

Signature-based intrusion detection systems use a set of attack descriptions to analyze event streams, looking for evidence of malicious behavior. If the signatures are expressed in a well-defined language, it is possible to analyze the attack signatures and automatically generate events or series of events that conform to the attack descriptions. This approach has been used in tools whose goal is to force intrusion detection systems to generate a large number of detection alerts. The resulting "alert storm" is used to desensitize intrusion detection system administrators and hide attacks in the event stream. We apply a similar technique to perform testing of intrusion detection systems. Signatures from one intrusion detection system are used as input to an event stream generator that produces randomized synthetic events that match the input signatures. The resulting event stream is then fed to a number of different intrusion detection systems and the results are analyzed. This paper presents the general testing approach and describes the first prototype of a tool, called Mucus, that automatically generates network traffic using the signatures of the Snort network-based intrusion detection system. The paper describes preliminary cross-testing experiments with both an open-source and a commercial tool and reports the results. An evasion attack that was discovered as a result of analyzing the test results is also presented.
机译:签名的入侵检测系统使用一组攻击描述来分析事件流,寻找恶意行为的证据。如果签名以明确的语言表达,则可以分析攻击签名,并自动生成符合攻击描述的事件或一系列事件。这种方法已用于工具,其目标是强制入侵检测系统生成大量检测警报。由此产生的“警报风暴”用于脱敏入侵检测系统管理员并隐藏事件流中的攻击。我们应用类似的技术来执行入侵检测系统的测试。从一个入侵检测系统的签名用作事件流生成器的输入,该生成器产生与输入签名匹配的随机合成事件。然后将得到的事件流馈送到多个不同的入侵检测系统,并分析结果。本文介绍了一般的测试方法,并描述了一种称为粘液的工具的第一个原型,它使用Snort网络的入侵检测系统的签名自动生成网络流量。本文介绍了初步交叉测试实验与开源和商业工具,并报告结果。还提出了作为分析测试结果而发现的逃避攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号