Talk:Intrusion detection system evasion techniques
|WikiProject Computer Security / Computing|
|This article is/was the subject of a Wiki Education Foundation-supported course assignment. Further details are available on the course page. Student editor(s) Pickyt will be working on it.|
My first wiki page - so I'm sure it will need some editing to comply with wiki standards. This page takes content from the Intrusion detection system entry and fleshes it out, and also fills in the missing Tiny Fragment Attack and Overlapping Fragment Attack entries requested on Wikipedia:Requested articles/Applied_arts_and_sciences/Computer_science,_computing,_and_Internet --Sgorton 21:08, 5 February 2007 (UTC)
this article needs some serious additions, there should be discussion of Dan Kaminsky's temporal ip fraging attacks, there should be mention of different web encodings, like chuncked encodings to evade, use of uuencoding in email, url encoding in uri's, double and tripple url encodings, gziping web pages, msrpc fragmentation, many IPSs simply look for jmp esp offsets, so changing the defaults on an exploit often works, playing games with TCP segmentation rules for accept first vs accept last can be used, mislabling file types, embedding one type in another (as seen on some of Alex Wheeler's AV bugs), unicode in url's, tunneling traffic using something like ip in ip often works (when applicable), encrypting connections to target hosts (e.g. attacking apache over ssl so the IPS cant see it), encoding a web page with java script and assembling offending content client side, double/tripple/etc encoding with java script...those are just a few off the top of my head, some of that is covered a little bit but it would be nice some of this added...I can try to add some of that as time permits --Michael Lynn 01:03, 21 March 2007 (UTC)
- Sure, those would be good things to add in. Do you think that 'encoding' is part of 'obfuscation', or is its own top-level evasion category? I'm leaning toward the latter, particularly after your list of encoding-related techniques. I can try to add some when I have time, or you can, either way. --Sgorton 17:48, 22 March 2007 (UTC)
Plans for additions
Hi, I wanted to get some feedback on the edits I'm planning on making to this article (sometime between April 5th & 8th).
I'm planning to group techniques into 3 sections with subsections:
- Insertion and Evasion: Fragmentation & Small packets, Overlapping fragments and TCP segments, Protocol ambiguities, Low-bandwidth attacks
- Payload obfuscation: Encodings and Encryption, Polymorphism
- Denial of Service: CPU Exhaustion, Memory Exhaustion, Operator Fatigue
I'm also adding citations. Here's what I have so far:
- Ptacek, Thomas H.; Newsham, Timothy N. (1998-01-01). "Insertion, evasion, and denial of service: Eluding network intrusion detection".
- Cheng, Tsung-Huan; Lin, Ying-Dar; Lai, Yuan-Cheng; Lin, Po-Ching. "Evasion Techniques: Sneaking through Your Intrusion Detection/Prevention Systems". IEEE Communications Surveys & Tutorials 14 (4): 1011–1020. doi:10.1109/surv.2011.092311.00082.
- Corona, Igino; Giacinto, Giorgio; Roli, Fabio. "Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues". Information Sciences 239: 201–225. doi:10.1016/j.ins.2013.03.022.
- Chaboya, D. J.; Raines, R. A.; Baldwin, R. O.; Mullins, B. E. (2006-11-01). "Network Intrusion Detection: Automated and Manual Methods Prone to Attack and Evasion". IEEE Security Privacy 4 (6): 36–43. doi:10.1109/MSP.2006.159. ISSN 1540-7993.
If anyone has any pointers for papers to look at, I'd really appreciate it.