Characteristics of Buffer Overflow Attacks Tunneled in HTTP Traffic

被引:0
|
作者
Homoliak, Ivan [1 ]
Ovsonka, Daniel [1 ]
Koranda, Karel [1 ]
Hanacek, Petr [1 ]
机构
[1] Brno Univ Technol, Fac Informat Technol, Bozetechova 1-2, Brno 61266, Czech Republic
关键词
protocol tunneling; network vulnerabilities; buffer overflow; obfuscation; NBA; AIPS; ASNM;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The purpose of this article is to describe characteristics of obfuscated network buffer overflow attacks in contrast with characteristics of directly simulated attacks. The obfuscation was performed by tunneling of malicious traffic in HTTP and HTTPS protocols. These protocols wrap a malicious communication between an attacker situated outside of an intranet and a callback located inside of an intranet. The detection analysis which we perform is based on features extraction from network packets dumps and it employs a behavioral and statistical analysis of communications' progress in time and packet index domain. There were performed experiments in four scenarios simulating traffic shaping, traffic policing and transmission on unreliable network channel to make properties of direct attacks and obfuscated attacks as various as possible. Next part of this article is comparison of obfuscated and direct attacks classification by our previously designed ASNM network features with state-of-art features set of A. Moore, both representing statistical and behavioral based experimental academic kernels for NBA. Presented results show better classification accuracy of ASNM features in all kinds of experiments.
引用
收藏
页数:6
相关论文
共 50 条
  • [11] Buffer overflow asymptotics for multiplexed regulated traffic
    Ying, Y.
    Guillemin, F.
    Mazumdar, R.
    Rosenberg, C.
    PERFORMANCE EVALUATION, 2008, 65 (08) : 555 - 572
  • [12] Survey of Protections from Buffer-Overflow Attacks
    Piromsopa, Krerk
    Enbody, Richard J.
    ENGINEERING JOURNAL-THAILAND, 2011, 15 (02): : 31 - 52
  • [13] Buffer overflow attacks on linux principles analyzing and protection
    Gu, ZM
    Yao, JD
    Qin, J
    DCABES 2002, PROCEEDING, 2002, : 385 - 387
  • [14] Hardware solution for detection and prevention of buffer overflow attacks
    Zhang, YH
    Wang, JB
    Xu, ZH
    Yan, XL
    Wang, LY
    2003 5TH INTERNATIONAL CONFERENCE ON ASIC, VOLS 1 AND 2, PROCEEDINGS, 2003, : 1304 - 1307
  • [15] Detection of Network Buffer Overflow Attacks: A Case Study
    Maros, Barabas
    Ivan, Homoliak
    Matej, Kacic
    Petr, Hanacek
    2013 47TH INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2013,
  • [16] StackOFFence: A technique for defending against buffer overflow attacks
    Madan, BB
    Phoha, S
    Trivedi, KS
    ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, 2005, : 656 - 661
  • [17] On evolving buffer overflow attacks using genetic programming
    Kayacik, Hilmi Guenes
    Heywood, Malcolm
    Zincir-Heywood, Nur
    GECCO 2006: GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE, VOL 1 AND 2, 2006, : 1667 - +
  • [18] A dynamic mechanism for recovering from buffer overflow attacks
    Sidiroglou, S
    Giovanidis, G
    Keromytis, AD
    INFORMATION SECURITY, PROCEEDINGS, 2005, 3650 : 1 - 15
  • [19] A hybrid method of defense against buffer overflow attacks
    Dasari, Annapurna
    Dasgupta, Partha
    PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON COMMUNICATION, NETWORK, AND INFORMATION SECURITY, 2005, : 195 - 200
  • [20] A processor architecture Defense against buffer overflow attacks
    McGregor, JP
    Karig, DK
    Shi, ZJ
    Lee, RB
    ITRE2003: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: RESEARCH AND EDUCATION, 2003, : 243 - 250