Characteristics of Buffer Overflow Attacks Tunneled in HTTP Traffic

被引:0
|
作者
Homoliak, Ivan [1 ]
Ovsonka, Daniel [1 ]
Koranda, Karel [1 ]
Hanacek, Petr [1 ]
机构
[1] Brno Univ Technol, Fac Informat Technol, Bozetechova 1-2, Brno 61266, Czech Republic
关键词
protocol tunneling; network vulnerabilities; buffer overflow; obfuscation; NBA; AIPS; ASNM;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The purpose of this article is to describe characteristics of obfuscated network buffer overflow attacks in contrast with characteristics of directly simulated attacks. The obfuscation was performed by tunneling of malicious traffic in HTTP and HTTPS protocols. These protocols wrap a malicious communication between an attacker situated outside of an intranet and a callback located inside of an intranet. The detection analysis which we perform is based on features extraction from network packets dumps and it employs a behavioral and statistical analysis of communications' progress in time and packet index domain. There were performed experiments in four scenarios simulating traffic shaping, traffic policing and transmission on unreliable network channel to make properties of direct attacks and obfuscated attacks as various as possible. Next part of this article is comparison of obfuscated and direct attacks classification by our previously designed ASNM network features with state-of-art features set of A. Moore, both representing statistical and behavioral based experimental academic kernels for NBA. Presented results show better classification accuracy of ASNM features in all kinds of experiments.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] A New Class of Buffer Overflow Attacks
    Kundu, Ashish
    Bertino, Elisa
    31ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2011), 2011, : 730 - 739
  • [2] Detection and prevention of stack buffer overflow attacks
    Kuperman, BA
    Brodley, CE
    Ozdoganoglu, H
    Vijaykumar, TN
    Jalote, A
    COMMUNICATIONS OF THE ACM, 2005, 48 (11) : 50 - 56
  • [3] Evolving buffer overflow attacks with detector feedback
    Kayacik, H. Gunes
    Heywood, Malcolm I.
    Zincir-Heywood, A. Nur
    APPLICATIONS OF EVOLUTIONARY COMPUTING, PROCEEDINGS, 2007, 4448 : 11 - +
  • [4] Defeating buffer overflow attacks via virtualization
    Tian, Donghai
    Xiong, Xi
    Hu, Changzhen
    Liu, Peng
    COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (06) : 1940 - 1950
  • [5] Stack Overflow Fence: A Technique for Defending Against Buffer Overflow Attacks
    Madan, Bharat B.
    Phoha, Shashi
    Trivedi, Kishor S.
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2006, 1 (02): : 129 - 136
  • [6] Study on the Principle and Defense of Buffer Overflow Attacks
    Lin, Wang
    INTERNATIONAL CONFERENCE ON GRAPHIC AND IMAGE PROCESSING (ICGIP 2012), 2013, 8768
  • [7] New chips stop buffer overflow attacks
    Dailey, L
    COMPUTER, 2004, 37 (10) : 28 - 28
  • [8] A Taxonomy of Buffer Overflow Characteristics
    Bishop, Matt
    Engle, Sophie
    Howard, Damien
    Whalen, Sean
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (03) : 305 - 317
  • [9] Buffer overflow asymptotics for a buffer handling many traffic sources
    Courcoubetis, C
    Weber, R
    JOURNAL OF APPLIED PROBABILITY, 1996, 33 (03) : 886 - 903