Towards Evasive Attacks : Anomaly Detection Resistance Analysis on the Internet

نویسندگان

  • Jing Jin
  • Jennifer Espinola
  • Carrie Zheng
  • Donglin Wang
چکیده

TOWARDS EVASIVE ATTACKS: ANOMALY DETECTION RESISTANCE ANALYSIS ON THE INTERNET Jing Jin, PhD George Mason University, 2013 Dissertation Director: Dr. Jeff Offutt The Internet is rapidly improving as a platform for deploying sophisticated interactive applications especially in Web 2.0. Although the shift from desktop-centric applications brings many benefits to web-based computing and cloud computing, such as efficient communication with ubiquitous access and availability, the way that Internet users share and exchange information also opens their own information to security problems. Today, attackers conduct malicious activities to routinely track the identities of internet-connected users, steal privacy data, abuse users personal information, and expose the users unwanted data or programs. Although these attackers can also accomplish these goals by other means, the Internet has made it much easier for attackers to locate victims, discover sensitive information and initiate unsolicited communication with the victims. To detect attacks from the Internet, anomaly detection methods have been proposed to compare abnormal behavior from malicious activities with legitimate behavior. While detection techniques have been developed, evasive techniques have not been widely studied. This dissertation explores the limitation of current anomaly detection in the context of the battle between detectors and attackers by finding potential evasive attacks and measuring detection resistance of evasive techniques. This dissertation studies detection resistance at user application and IP layer. This dissertation first explores the limitations of current Human Observational Proofs (HOP) based bot detection systems by creating a new evasive bot system that masquerades as human beings on the Web. Specifically, I characterize the existing HOP-based web bot detectors and develop an evasion framework based on human behavior patterns. Instead of subverting a specific detection system, the major goal of this study is to provide a systematic approach to evaluate and explore the limitations of current HOP-based detection systems on the web. This dissertation also explores the limitations of IP timing covert channel detection systems by analyzing the stealthiness of timing covert channels. For evasive techniques, this dissertation studies passive detection resistance and active detection resistance with various evasive methods such as mimic, mix and replay, coding scheme rotation, etc. It defines a new measurement approach to evaluate covert channel evasion capabilities. The major goal of this study is to provide a systematic approach to better understand the design of IP timing covert channels. Both studies use similarity measurement that measures the similarity between legitimate behavior and abnormal behavior. This similarity measurement evaluates the capability of evasion against detection methods with detection independent approach.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Survey of Anomaly Detection Approaches in Internet of Things

Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes. In this ...

متن کامل

Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism

Today, the use of the Internet and Internet sites has been an integrated part of the people’s lives, and most activities and important data are in the Internet websites. Thus, attempts to intrude into these websites have grown exponentially. Intrusion detection systems (IDS) of web attacks are an approach to protect users. But, these systems are suffering from such drawbacks as low accuracy in ...

متن کامل

Moving dispersion method for statistical anomaly detection in intrusion detection systems

A unified method for statistical anomaly detection in intrusion detection systems is theoretically introduced. It is based on estimating a dispersion measure of numerical or symbolic data on successive moving windows in time and finding the times when a relative change of the dispersion measure is significant. Appropriate dispersion measures, relative differences, moving windows, as well as tec...

متن کامل

Dynamic anomaly detection by using incremental approximate PCA in AODV-based MANETs

Mobile Ad-hoc Networks (MANETs) by contrast of other networks have more vulnerability because of having nature properties such as dynamic topology and no infrastructure. Therefore, a considerable challenge for these networks, is a method expansion that to be able to specify anomalies with high accuracy at network dynamic topology alternation. In this paper, two methods proposed for dynamic anom...

متن کامل

Intrusion Detection in IOT based Networks Using Double Discriminant Analysis

Intrusion detection is one of the main challenges in wireless systems especially in Internet of things (IOT) based networks. There are various attack types such as probe, denial of service, remote to local and user to root. In addition to known attacks and malicious behaviors, there are various unknown attacks that some of them have similar behavior with respect to each other or mimic the norma...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013