Backtracking Algorithmic Complexity Attacks Against a NIDS

dc.contributor.authorSmith, Randyen_US
dc.contributor.authorEstan, Cristianen_US
dc.contributor.authorJha, Someshen_US
dc.date.accessioned2012-03-15T17:20:21Z
dc.date.available2012-03-15T17:20:21Z
dc.date.created2006en_US
dc.date.issued2006en_US
dc.description.abstractNetwork Intrusion Detection Systems (NIDS) have become crucial to securing modern networks. To be effective, a NIDS must be able to counter evasion attempts and operate at or near wire-speed. Failure to do so allows malicious packets to slip through a NIDS undetected. In this paper, we explore NIDS evasion through algorithmic complexity attacks. We present a highly effective attack against the Snort NIDS, and we provide a practical algorithmic solution that successfully thwarts the attack. This attack exploits the behavior of rule matching, yielding inspection times that are up to 1.5 million times slower than that of benign packets. Our analysis shows that this attack is applicable to many rules in Snort?s ruleset, rendering vulnerable the thousands of networks protected by it. Our countermeasure confines the inspection time to within one order of magnitude of benign packets. Experimental results using a live system show that an attacker needs only 4.0 kbps of bandwidth to perpetually disable an unmodified NIDS, whereas all intrusions are detected when our countermeasure is used.en_US
dc.format.mimetypeapplication/pdfen_US
dc.identifier.citationTR1561en_US
dc.identifier.urihttp://digital.library.wisc.edu/1793/60496
dc.publisherUniversity of Wisconsin-Madison Department of Computer Sciencesen_US
dc.titleBacktracking Algorithmic Complexity Attacks Against a NIDSen_US
dc.typeTechnical Reporten_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
TR1561.pdf
Size:
251.11 KB
Format:
Adobe Portable Document Format