The Problem of NIDS Evasion in Mobile Networks

作者: M Colajanni , Luca Dal Zotto , M Marchetti , M Messori

DOI: 10.1109/NTMS.2011.5721046

关键词:

摘要: This paper presents a novel NIDS evasion strategy that allows attackers to exploit network mobility perform attacks undetectable by modern NIDSs. Mobility-based works combining traditional techniques and node mobility. It represents generally applicable on several protocols for mobility, it is effective against state-of-the- art well configured signature-based We describe three scenarios based demonstrate the practical applicability of proposed through proof concept attack in realistic environment. conclude presenting some ideas addressing mobility-based evasion.

参考文章(17)
Mirco Marchetti, Michele Messori, Michele Colajanni, Peer-to-Peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale Lecture Notes in Computer Science. pp. 475- 490 ,(2009) , 10.1007/978-3-642-04474-8_37
C. Perkins, IP Mobility Support for IPv4 RFC. ,vol. 3220, pp. 1- 98 ,(2002)
Vern Paxson, Christian Kreibich, Mark Handley, Network intrusion detection: evasion, traffic normalization, and end-to-end protocol semantics usenix security symposium. pp. 9- 9 ,(2001)
Vinod Yegneswaran, Paul Barford, Somesh Jha, Global Intrusion Detection in the DOMINO Overlay System. network and distributed system security symposium. ,(2004)
Matthias Vallentin, Robin Sommer, Jason Lee, Craig Leres, Vern Paxson, Brian Tierney, The NIDS cluster: scalable, stateful network intrusion detection on commodity hardware recent advances in intrusion detection. pp. 107- 126 ,(2007) , 10.1007/978-3-540-74320-0_6
Michele Colajanni, Daniele Gozzi, Mirco Marchetti, Enhancing interoperability and stateful analysis of cooperative network intrusion detection systems Proceedings of the 3rd ACM/IEEE Symposium on Architecture for networking and communications systems - ANCS '07. pp. 165- 174 ,(2007) , 10.1145/1323548.1323576
C.E. Perkins, Mobile networking through Mobile IP IEEE Internet Computing. ,vol. 2, pp. 58- 69 ,(1998) , 10.1109/4236.656077
R. Hinden, S. Deering, Internet Protocol, Version 6 (IPv6) Specification Internet Protocol, Version 6 (IPv6) Specification. ,vol. 1883, pp. 1- 37 ,(1995)
Randy Smith, Cristian Estan, Somesh Jha, Backtracking Algorithmic Complexity Attacks against a NIDS annual computer security applications conference. pp. 89- 98 ,(2006) , 10.1109/ACSAC.2006.17