【24h】

Anagram: A Content Anomaly Detector Resistant to Mimicry Attack

机译:Anagram:抗模仿攻击的内容异常检测器

获取原文
获取原文并翻译 | 示例

摘要

In this paper, we present Anagram, a content anomaly detector that models a mixture of high-order n-grams (n > 1) designed to detect anomalous and "suspicious" network packet payloads. By using higher-order n-grams, Anagram can detect significant anomalous byte sequences and generate robust signatures of validated malicious packet content. The Anagram content models are implemented using highly efficient Bloom filters, reducing space requirements and enabling privacy-preserving cross-site correlation. The sensor models the distinct content flow of a network or host using a semi-supervised training regimen. Previously known exploits, extracted from the signatures of an IDS, are likewise modeled in a Bloom filter and are used during training as well as detection time. We demonstrate that Anagram can identify anomalous traffic with high accuracy and low false positive rates. Anagram's high-order n-gram analysis technique is also resilient against simple mimicry attacks that blend exploits with "normal" appearing byte padding, such as the blended polymorphic attack recently demonstrated in [1]. We discuss randomized n-gram models, which further raises the bar and makes it more difficult for attackers to build precise packet structures to evade Anagram even if they know the distribution of the local site content flow. Finally, Anagram's speed and high detection rate makes it valuable not only as a standalone sensor, but also as a network anomaly flow classifier in an instrumented fault-tolerant host-based environment; this enables significant cost amortization and the possibility of a "symbiotic" feedback loop that can improve accuracy and reduce false positive rates over time.
机译:在本文中,我们介绍了Anagram,这是一种内容异常检测器,可对旨在检测异常和“可疑”网络数据包有效载荷的高阶n-gram(n> 1)的混合进行建模。通过使用高阶n-gram,Anagram可以检测到重要的异常字节序列,并生成经过验证的恶意数据包内容的强大签名。 Anagram内容模型使用高效的Bloom过滤器实现,从而减少了空间需求并实现了隐私保护跨站点关联。传感器使用半监督的训练方案对网络或主机的独特内容流进行建模。从IDS签名中提取的先前已知漏洞利用同样会在Bloom过滤器中建模,并在训练和检测时间中使用。我们证明了Anagram可以以高准确性和低误报率识别异常流量。 Anagram的高阶n-gram分析技术还可以抵抗简单的模仿攻击,这种攻击将漏洞利用与出现的“正常”字节填充混合在一起,例如最近在[1]中展示的混合多态攻击。我们讨论了随机的n-gram模型,这进一步提高了标准,并使攻击者即使知道本地站点内容流的分布,也难以构建精确的数据包结构来逃避Anagram。最后,Anagram的速度和高检测率使其不仅作为独立的传感器,而且在基于仪器的容错主机环境中作为网络异常流分类器,都具有很高的价值。这样就可以实现大笔成本摊销,并有可能出现“共生”反馈回路,从而提高准确性并减少一段时间内的误报率。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号