Automatically evading IDS using GP authored attacks

被引:8
|
作者
Kayacik, H. Guenes [1 ]
Zincir-Heywood, A. Nur [1 ]
Heywood, Malcolm I. [1 ]
机构
[1] Dalhousie Univ, Fac Comp Sci, 6050 Univ Ave, Halifax, NS B3H 1W5, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
D O I
10.1109/CISDA.2007.368148
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A mimicry attack is a type of attack where the basic steps of a minimalist 'core' attack are used to design multiple attacks achieving the same objective from the same application. Research in mimicry attacks is valuable in determining and eliminating weaknesses of detectors. In this work, we provide a genetic programming based automated process for designing all components of a mimicry attack relative to the Stide detector under a vulnerable Traceroute application. Results indicate that the automatic process is able to generate mimicry attacks that reduce the alarm rate from similar to 65% of the original attack, to similar to 2.7%, effectively making the attack indistinguishable from normal behaviors.
引用
收藏
页码:153 / +
页数:3
相关论文
共 50 条
  • [1] Replacement attacks: automatically evading behavior-based software birthmark
    Zhi Xin
    Huiyu Chen
    Xinche Wang
    Peng Liu
    Sencun Zhu
    Bing Mao
    Li Xie
    International Journal of Information Security, 2012, 11 : 293 - 304
  • [2] Replacement attacks: automatically evading behavior-based software birthmark
    Xin, Zhi
    Chen, Huiyu
    Wang, Xinche
    Liu, Peng
    Zhu, Sencun
    Mao, Bing
    Xie, Li
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2012, 11 (05) : 293 - 304
  • [3] Shadow attacks: automatically evading system-call-behavior based malware detection
    Ma, Weiqin
    Duan, Pu
    Liu, Sanmin
    Gu, Guofei
    Liu, Jyh-Charn
    JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2012, 8 (1-2): : 1 - 13
  • [4] Detecting SQL Injection Attacks Using SNORT IDS
    Alnabulsi, Hussein
    Islam, Md Rafiqul
    Mamun, Quazi
    2014 ASIA-PACIFIC WORLD CONGRESS ON COMPUTER SCIENCE AND ENGINEERING (APWC ON CSE), 2014,
  • [5] DoS Attacks Prevention Using IDS and Data Mining
    Keshri, Anand
    Singh, Sukhpal
    Agarwal, Mayank
    Nandi, Sunit Kumar
    2016 INTERNATIONAL CONFERENCE ON ACCESSIBILITY TO DIGITAL WORLD (ICADW), 2016, : 86 - 91
  • [6] Detection of Attacks for IDS using Association Rule Mining Algorithm
    Devaraju, S.
    Ramakrishnan, S.
    IETE JOURNAL OF RESEARCH, 2015, 61 (06) : 624 - 633
  • [7] IDS Using Mitigation Rules Approach to Mitigate ICMP Attacks
    Hadi, Adi Dewiyana Abdul
    Azmat, FarokHj.
    Ali, Fakariah Hani Mohd
    2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT), 2014, : 54 - 59
  • [8] A COMPREHENSIVE IDS TO DETECT BOTNET ATTACKS USING MACHINE LEARNING TECHNIQUES
    Alghamdi, Abdullah
    Barsoum, Ayad
    2024 IEEE 3RD INTERNATIONAL CONFERENCE ON COMPUTING AND MACHINE INTELLIGENCE, ICMI 2024, 2024,
  • [9] Literature Survey - IDS for DDoS Attacks
    Prajapati, Naveen Mohan
    Mishra, Atish
    Bhanodia, Praveen
    2014 CONFERENCE ON IT IN BUSINESS, INDUSTRY AND GOVERNMENT (CSIBIG), 2014,
  • [10] Automatically Evading Classifiers A Case Study on PDF Malware Classifiers
    Xu, Weilin
    Qi, Yanjun
    Evans, David
    23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016), 2016,