N-gram against the machine : on the feasibility of the N-gram network analysis for binary protocols

D. Hadziosmanovic, L. Simionato, D. Bolzoni, E. Zambon, S. Etalle

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

57 Citaten (Scopus)
3 Downloads (Pure)

Samenvatting

In recent years we have witnessed several complex and high-impact attacks specifically targeting "binary" protocols (RPC, Samba and, more recently, RDP). These attacks could not be detected by current – signature-based – detection solutions, while – at least in theory – they could be detected by state-of-the-art anomaly-based systems. This raises once again the still unanswered question of how effective anomaly-based systems are in practice. To contribute to answering this question, in this paper we investigate the effectiveness of a widely studied category of network intrusion detection systems: anomaly-based algorithms using n-gram analysis for payload inspection. Specifically, we present a thorough analysis and evaluation of several detection algorithms using variants of n-gram analysis on real-life environments. Our tests show that the analyzed systems, in presence of data with high variability, cannot deliver high detection and low false positive rates at the same time.
Originele taal-2Engels
TitelResearch in attacks, intrusions, and defenses (15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings)
RedacteurenD. Balzarotti, S.J. Stolfo, M. Cova
Plaats van productieBerlin
UitgeverijSpringer
Pagina's354-373
ISBN van geprinte versie978-3-642-33337-8
DOI's
StatusGepubliceerd - 2012
Evenementconference; 15th International Symposium on Research in Attacks, Intrusions, and Defenses; 2012-09-12; 2012-09-14 -
Duur: 12 sep 201214 sep 2012

Publicatie series

NaamLecture Notes in Computer Science
Volume7462
ISSN van geprinte versie0302-9743

Congres

Congresconference; 15th International Symposium on Research in Attacks, Intrusions, and Defenses; 2012-09-12; 2012-09-14
Periode12/09/1214/09/12
Ander15th International Symposium on Research in Attacks, Intrusions, and Defenses

Vingerafdruk

Duik in de onderzoeksthema's van 'N-gram against the machine : on the feasibility of the N-gram network analysis for binary protocols'. Samen vormen ze een unieke vingerafdruk.

Citeer dit