作者: Michalis Polychronakis , Kostas G. Anagnostakis , Evangelos P. Markatos
DOI: 10.1007/978-3-540-74320-0_5
关键词: Embedded system 、 Emulation 、 Polymorphic code 、 Detector 、 Class (computer programming) 、 Computer science 、 Throughput (business) 、 Real-time computing 、 Shellcode 、 Heuristic (computer science) 、 False positive paradox
摘要: Network-level emulation has recently been proposed as a method for the accurate detection of previously unknown polymorphic code injection attacks. In this paper, we extend network-level along two lines. First, present an improved execution behavior heuristic that enables certain class non-self-contained shellcodes are currently missed by existing emulation-based approaches. Second, generic algorithmic optimizations improve runtime performance detector. We have implemented prototype technique and evaluated it using off-the-shelf shellcode engines benign data. The detector achieves modest processing throughput, which however is enough decent on actual deployments, while not produced any false positives. Finally, report attack activity statistics from seven-month deployment our in production network, demonstrate effectiveness practicality approach.