作者: Ali Abbasi , Jos Wetzels , Wouter Bokslag , Emmanuele Zambon , Sandro Etalle
DOI: 10.1007/978-3-319-11379-1_19
关键词: Shellcode 、 Network packet 、 Signature (logic) 、 Emulation 、 Computer science 、 Process (computing) 、 Network intrusion detection 、 Embedded system 、 Evasion (network security) 、 Encoder
摘要: Emulation-based network intrusion detection systems have been devised to detect the presence of shellcode in traffic by trying execute (portions of) packet payloads an in- strumented environment and checking execution traces for signs activity. are regarded as a significant step forward with regards traditional signature-based systems, they allow detecting polymorphic (i.e., en- crypted) shellcode. In this paper we investigate test actual effec- tiveness emulation-based show that can be circumvented employing wide range evasion techniques, ex- ploiting weakness present at all three levels process. We draw conclusion current limitations attackers craft generic encoders able circumvent their mechanisms.