DocumentCode :
3040377
Title :
Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection?
Author :
Kayacik, H.G. ; Zincir-Heywood, A. Nur
Author_Institution :
Fac. of Comput. Sci., Dalhousie Univ., Halifax, NS
fYear :
2008
fDate :
1-3 Oct. 2008
Firstpage :
213
Lastpage :
223
Abstract :
Mimicry attacks have been the focus of detector research where the objective of the attacker is to generate an attack that evades detection while achieving the attackerpsilas goals. If such an attack can be found, it implies that the target detector is vulnerable against mimicry attacks. In this work, we emphasize that there are two components of a buffer overflow attack: the preamble and the exploit. Although the attacker can modify the exploit component easily, the attacker may not be able to prevent preamble from generating anomalous behavior since during preamble stage, the attacker does not have full control. Previous work on mimicry attacks considered an attack to completely evade detection, if the exploit raises no alarms. On the other hand, in this work, we investigate the source of anomalies in both the preamble and the exploit components against two anomaly detectors that monitor four vulnerable UNIX applications. Our experiment results show that preamble can be a source of anomalies, particularly if it is lengthy and anomalous.
Keywords :
object detection; security of data; UNIX applications; anomalous behavior; buffer overflow attack; mimicry attacks; target detector; Assembly; Buffer overflow; Computer science; Databases; Detectors; Gain control; Information analysis; Monitoring; Privacy; System testing; Information hiding; anomaly detection; mimicry attacks; vulnerability testing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Privacy, Security and Trust, 2008. PST '08. Sixth Annual Conference on
Conference_Location :
Fredericton, NB
Print_ISBN :
978-0-7695-3390-2
Type :
conf
DOI :
10.1109/PST.2008.25
Filename :
4641288
Link To Document :
بازگشت