1. A Generation Framework of Multiple Evasions on IDS
- Author
-
Dong Lipeng, Chen Xing-yuan, Tang Huilin, and Shi Wang
- Subjects
Engineering ,business.industry ,Evasion (network security) ,Intrusion detection system ,Computer security ,computer.software_genre ,Probability of success ,Intrusion ,Encoding (memory) ,Code (cryptography) ,business ,computer ,Host (network) ,Computer network - Abstract
Intrusion detection technology aimed at identifying hidden illegal intrusion by the analysis of network traffic. To an attacker, if he wants to send malicious code to a protected host in the internal network, he has to firstly evade the detection of the intrusion detection system (IDS). The IDS evasion techniques enable IDS produce omission or misstatement, can greatly increase the probability of success attacks. But after years of the contest between evasion and anti-evasion, individual evasions and random combined evasions is difficult to implement and also inefficient. This paper is committed to providing a systematic and scientific generation method for multiple evasions. Using this framework, we are able to design a complete system for IDS anti-evasion testing, and provide recommendations for giving IDS policies.
- Published
- 2013