Emulation-based network intrusion detection systems have been devised to detect the presence of shellcode in network traffic by trying to execute (portions of) the network packet payloads in an instrumented environment and checking the execution traces for signs of shellcode activity. Emulation-based network intrusion detection systems are regarded as a significant step forward with regards to traditional signature-based systems, as they allow detecting polymorphic (i.e., encrypted) shellcode. In this paper we investigate and test the actual effectiveness of emulation-based detection and show that the detection can be circumvented by employing a wide range of evasion techniques, exploiting weakness that are present at all three levels in the detection process. We draw the conclusion that current emulation-based systems have limitations that allow attackers to craft generic shellcode encoders able to circumvent their detection mechanisms.
Keywords: Emulation; IDS; Shellcode; Evasion; Polymorphism
|Name||Lecture Notes in Computer Science|
|Conference||conference; 17th International Symposium on Research in Attacks, Intrusions and Defenses; 2014-09-17; 2014-09-19|
|Period||17/09/14 → 19/09/14|
|Other||17th International Symposium on Research in Attacks, Intrusions and Defenses|