作者: Kymie M. C. Tan , Kevin S. Killourhy , Roy A. Maxion
关键词: Intrusion 、 Offensive 、 System call 、 Anomaly-based intrusion detection system 、 Adversary 、 Exploit 、 Anomaly (physics) 、 Computer security 、 Computer science 、 Intrusion detection system
摘要: Over the past decade many anomaly-detection techniques have been proposed and/or deployed to provide early warnings of cyberattacks, particularly those attacks involving masqueraders and novel methods. To date, however, there appears be no study which has identified a systematic method that could used by an attacker undermine anomaly-based intrusion detection system. This paper shows how adversary can craft offensive mechanism renders detector blind presence on-going, common attacks. It presents identifies weaknesses detector, manipulate exploit weaknesses. The explores implications this threat, suggests possible improvements for existing future systems.