Misleading worm signature generators using deliberate noise injection

作者: R. Perdisci , D. Dagon , Wenke Lee , P. Fogla , M. Sharif

DOI: 10.1109/SP.2006.26

关键词:

摘要: … This study suggests that unless an accurate and robust flow classification process is in place, automatic syntactic-based signature generators are vulnerable to such noise injection …

参考文章(19)
Brad Karp, Hyang-Ah Kim, Autograph: toward automated, distributed worm signature detection usenix security symposium. pp. 19- 19 ,(2004)
Oleg Kolesnikov, Wenke Lee, Advanced Polymorphic Worms: Evading IDS by Blending in with Normal Traffic Georgia Institute of Technology. ,(2005)
Daniel C. DuVarney, Sandeep Bhatkar, R. Sekar, Address obfuscation: an efficient approach to combat a board range of memory error exploits usenix security symposium. pp. 8- 8 ,(2003)
Vern Paxson, Christian Kreibich, Mark Handley, Network intrusion detection: evasion, traffic normalization, and end-to-end protocol semantics usenix security symposium. pp. 9- 9 ,(2001)
S. Rubin, S. Jha, B.P. Miller, Automatic generation and analysis of NIDS attacks annual computer security applications conference. pp. 28- 38 ,(2004) , 10.1109/CSAC.2004.9
Cristian Estan, George Varghese, Stefan Savage, Sumeet Singh, Automated worm fingerprinting operating systems design and implementation. pp. 4- 4 ,(2004)
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, N. Weaver, Inside the Slammer worm ieee symposium on security and privacy. ,vol. 1, pp. 33- 39 ,(2003) , 10.1109/MSECP.2003.1219056
Christian Kreibich, Jon Crowcroft, Honeycomb: creating intrusion detection signatures using honeypots acm special interest group on data communication. ,vol. 34, pp. 51- 56 ,(2004) , 10.1145/972374.972384
V. Fuller, K. Varadhan, J. Yu, T. Li, Classless Inter-Domain Routing (CIDR): an Address Assignment and Aggregation Strategy RFC 1519. ,vol. 1519, pp. 1- 24 ,(1993)
Giovanni Vigna, William Robertson, Davide Balzarotti, Testing network-based intrusion detection signatures using mutant exploits computer and communications security. pp. 21- 30 ,(2004) , 10.1145/1030083.1030088