Evaluating intrusion prevention systems with evasions

Summary Intrusion prevention systems have become a common security measure in the past 20 years. Their promise is the possibility to prevent known attacks against vulnerable, unpatched devices inside enterprise networks. However, evasion techniques that enable the attacker to evade the eye of the in...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of communication systems 2017-11, Vol.30 (16), p.n/a
Hauptverfasser: Särelä, Mikko, Kyöstilä, Tomi, Kiravuo, Timo, Manner, Jukka
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Summary Intrusion prevention systems have become a common security measure in the past 20 years. Their promise is the possibility to prevent known attacks against vulnerable, unpatched devices inside enterprise networks. However, evasion techniques that enable the attacker to evade the eye of the intrusion prevention system are a potential problem for this capability. These techniques take advantage of the robustness principle that has guided designers to create systems that will try to recreate protocol content from any input they receive. In this work, we evaluated the effectiveness of 35 well‐known evasions against 9 commercial and 1 free, state‐of‐the‐art, intrusion prevention systems. We conducted 4 experiments with one million attacks against each device. Each system lets a significant amount (0.1%‐45%) of attacks pass through unrecognized. Our results show that most existing intrusion prevention systems are vulnerable against evasions. Evasion techniques enable an attack to pass an intrusion prevention system unnoticed. We evaluated 10 IPS, running 4 million well‐known attacks with evasions against each device. Each system lets a significant amount of attacks pass through.
ISSN:1074-5351
1099-1131
DOI:10.1002/dac.3339