首页> 外文OA文献 >Detecting network-based obfuscated code injection attacks using sandboxing
【2h】

Detecting network-based obfuscated code injection attacks using sandboxing

机译:使用沙盒检测基于网络的混淆代码注入攻击

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。
获取外文期刊封面目录资料

摘要

Intrusion detection systems (IDSs) are widely recognised as the last line of defence often used to enable incident response when intrusion prevention mechanisms are ineffective, or have been compromised. A signature based network IDS (NIDS) which operates by comparing network traffic to a database of suspicious activity patterns (known as signatures) is a popular solution due to its ease of deployment and relatively low false positive (incorrect alert) rate. Lately, attack developers have focused on developing stealthy attacks designed to evade NIDS. One technique used to accomplish this is to obfuscate the shellcode (the executable component of an attack) so that it does not resemble the signatures the IDS uses to identify the attacks but is still logically equivalent to the clear-text attacks when executed. We present an approach to detect obfuscated code injection attacks, an approach which compensates for efforts to evade IDSs. This is achieved by executing those network traffic segments that are judged potentially to contain executable code and monitoring the execution to detect operating system calls which are a necessary component of any such code. This detection method is based not on how the injected code is represented but rather on the actions it performs. Correct configuration of the IDS at deployment time is crucial for correct operation when this approach is taken, in particular, the examined executable code must be executed in an environment identical to the execution environment of the host the IDS is monitoring with regards to both operating system and architecture. We have implemented a prototype detector that is capable of detecting obfuscated shellcodes in a Linux environment, and demonstrate how it can be used to detect new or previously unseen code injection attacks and obfuscated attacks as well as well known attacks.
机译:入侵检测系统(IDS)被广泛认为是防御的最后一道防线,通常在入侵防御机制无效或受到损害时用于启用事件响应。通过将网络流量与可疑活动模式的数据库进行比较而运行的基于签名的网络IDS(NIDS)(称为签名)是一种流行的解决方案,因为它易于部署并且具有相对较低的误报(错误警报)率。最近,攻击开发人员开始专注于开发旨在逃避NIDS的隐形攻击。实现此目的的一种技术是混淆shellcode(攻击的可执行组件),以使其与IDS用于标识攻击的签名不相似,但在逻辑上仍等同于执行时的明文攻击。我们提出一种检测混淆代码注入攻击的方法,该方法可以弥补逃避IDS的努力。通过执行可能被判断为包含可执行代码的那些网络流量段,并监视执行以检测作为任何此类代码的必要组成部分的操作系统调用,可以实现此目的。这种检测方法不是基于所表示的代码的表示方式,而是基于其执行的动作。采用这种方法时,在部署时正确配置IDS对于正确操作至关重要,特别是,必须在与IDS监视的两个操作系统有关的主机执行环境相同的环境中执行检查的可执行代码。和建筑。我们已经实现了一个原型检测器,该检测器能够在Linux环境中检测混淆的shellcode,并演示如何将其用于检测新的或以前未见过的代码注入攻击和混淆的攻击以及众所周知的攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号