High-Speed Matching of Vulnerability Signatures

نویسندگان

  • Nabil Schear
  • David R. Albrecht
  • Nikita Borisov
چکیده

Vulnerability signatures offer better precision and flexibility than exploit signatures when detecting network attacks. We show that it is possible to detect vulnerability signatures in high-performance network intrusion detection systems, by developing a matching architecture that is specialized to the task of vulnerability signatures. Our architecture is based upon: i) the use of high-speed pattern matchers, together with control logic, instead of recursive parsing, ii) the limited nature and careful management of implicit state, and iii) the ability to avoid parsing large fragments of the message not relevant to a vulnerability. We have built a prototype implementation of our architecture and vulnerability specification language, called VESPA, capable of detecting vulnerabilities in both text and binary protocols. We show that, compared to full protocol parsing, we can achieve 3x or better speedup, and thus detect vulnerabilities in most protocols at a speed of 1 Gbps or more. Our architecture is also well-adapted to being integrated with network processors or other special-purpose hardware. We show that for text protocols, pattern matching dominates our workload and great performance improvements can result from hardware acceleration.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

NetShield: Matching with a Large Vulnerability Signature Ruleset for High Performance Network Defense

Accuracy and speed are the two most im-portant metrics for Network Intrusion Detection or Pre-vention Systems (NIDS/NIPSes). Due to emerging poly-morphic attacks and the fact that in many cases regu-lar expressions (regexes) cannot capture the vulnerabil-ity conditions accurately, the accuracy of existing regex-based NIDS/NIPS systems has become a serious prob-lem. I...

متن کامل

Spatial Assessment of Regional Environmental Vulnerability for Environmental Planning in the Eastern Region of Urmia Lake

     Environment, development and sustainability are the three significant issues of worldwide concern. Environmental vulnerability and assessment of natural and anthropogenic activities impacts represent a comprehensive evaluation approach. The main purpose of this study is to present a comprehensive and novel framework in order to environmental vulnerability assessment using by spatial data a...

متن کامل

Towards Generating High Coverage Vulnerability-based Signatures with Protocol-level Constraint-guided Exploration (CMU-CyLab-08-009)

Signature-based input filtering is an important and widely deployed defense. But current signature generation methods have limited coverage and the generated signatures can be easily evaded by an attacker with small variations of the exploit message. In this paper, we propose protocol-level constraint-guided exploration, a new approach towards generating high coverage vulnerability-based signat...

متن کامل

Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration

Signature-based input filtering is an important and widely deployed defense. But current signature generation methods have limited coverage and the generated signatures often can be easily evaded by an attacker with small variations of the exploit message. In this paper, we propose protocol-level constraint-guided exploration, a new approach towards generating high coverage vulnerability-based ...

متن کامل

Nearest-neighbour Searching in Files of Text Signatures Using Transputer Networks

This paper discusses the implementation of nearest-neighbour document retrieval in serial files using transputer networks. The system uses a two-stage retrieval algorithm in which an initial text-signature search is used to exclude large numbers of documents from the detailed and time-consuming pattern-matching search. The latter is implemented using a processor farm, so that documents which ma...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008