THEMIS: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison

被引:2
|
作者
Wang, Zhongjie [1 ]
Zhu, Shitong [1 ]
Man, Keyu [1 ]
Zhu, Pengxiong [1 ]
Hao, Yu [1 ]
Qian, Zhiyun [1 ]
Krishnamurthy, Srikanth, V [1 ]
La Porta, Tom [2 ]
De Lucia, Michael J. [3 ]
机构
[1] Univ Calif Riverside, Riverside, CA 92521 USA
[2] Penn State Univ, State Coll, PA USA
[3] US Army Res Lab, Adelphi, MD USA
关键词
Network intrusion detection system; symbolic execution; TCP;
D O I
10.1145/3460120.3484762
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network intrusion detection systems (NIDS) can be evaded by carefully crafted packets that exploit implementation-level discrepancies between how they are processed on the NIDS and at the endhosts. These discrepancies arise due to the plethora of endhost implementations and evolutions thereof. It is prohibitive to proactively employ a large set of implementations at the NIDS and check incoming packets against all of those. Hence, NIDS typically choose simplified implementations that attempt to approximate and generalize across the different endhost implementations. Unfortunately, this solution is fundamentally flawed since such approximations are bound to have discrepancies with some endhost implementations. In this paper, we develop a lightweight system THEMIS, which empowers the NIDS in identifying these discrepancies and reactively forking its connection states when any packets with "ambiguities" are encountered. Specifically, THEMIS incorporates an offline phase in which it extracts models from various popular implementations using symbolic execution. During runtime, it maintains a nondeterministic finite automaton to keep track of the states for each possible implementation. Our extensive evaluations show that THEMIS is extremely effective and can detect all evasion attacks known to date, while consuming extremely low overhead. En route, we also discovered multiple previously unknown discrepancies that can be exploited to bypass current NIDS.
引用
收藏
页码:3384 / 3399
页数:16
相关论文
共 50 条
  • [1] AANet: An Ambiguity-Aware Network for Remote-Sensing Image Change Detection
    Hang, Renlong
    Xu, Siqi
    Yuan, Panli
    Liu, Qingshan
    [J]. IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, 2024, 62 : 1 - 11
  • [2] A network state based intrusion detection model
    Shan, Z
    Chen, P
    Xu, Y
    Xu, K
    [J]. 2001 INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND MOBILE COMPUTING, PROCEEDINGS, 2001, : 481 - 486
  • [3] Network based Intrusion Detection using Time aware LSTM Autoencoder
    Ratti, Ritesh
    Singh, Sanasam Ranbir
    Nandi, Sukumar
    [J]. 2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 2570 - 2578
  • [4] A Network Intrusion Detection Model Based on Convolutional Neural Network
    Tao, Wenwei
    Zhang, Wenzhe
    Hu, Chao
    Hu, Chaohui
    [J]. SECURITY WITH INTELLIGENT COMPUTING AND BIG-DATA SERVICES, 2020, 895 : 771 - 783
  • [5] ARAS: Ambiguity-aware Robust Active SLAM based on Multi-hypothesis State and Map Estimations
    Hsiao, Ming
    Mangelson, Joshua G.
    Suresh, Sudharshan
    Debrunner, Christian
    Kaess, Michael
    [J]. 2020 IEEE/RSJ INTERNATIONAL CONFERENCE ON INTELLIGENT ROBOTS AND SYSTEMS (IROS), 2020, : 5037 - 5044
  • [6] Network-Aware SDN Load Balancer with Deep Active Learning based Intrusion Detection Model
    Ahmed, Usman
    Lin, Jerry Chun-Wei
    Srivastava, Gautam
    [J]. 2021 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2021,
  • [7] Network intrusion detection based on the temporal convolutional model
    Lopes, Ivandro O.
    Zou, Deqing
    Abdulqadder, Ihsan H.
    Akbar, Saeed
    Li, Zhen
    Ruambo, Francis
    Pereira, Wagner
    [J]. COMPUTERS & SECURITY, 2023, 135
  • [8] Intrusion detection system model based on the neural network
    Li, Hongpei
    Wang, Xinmei
    [J]. Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 1999, 26 (05): : 667 - 670
  • [9] Network Intrusion Detection Model Based on CNN and GRU
    Cao, Bo
    Li, Chenghai
    Song, Yafei
    Qin, Yueyi
    Chen, Chen
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (09):
  • [10] Network intrusion detection model based on context verification
    [J]. Tian, Z. (tianzhihong@hit.edu.cn), 1600, Science Press (50):