Authors
David Wagner, Paolo Soto
Publication date
2002/11/18
Book
Proceedings of the 9th ACM Conference on Computer and Communications Security
Pages
255-264
Description
We examine several host-based anomaly detection systems and study their security against evasion attacks. First, we introduce the notion of a mimicry attack, which allows a sophisticated attacker to cloak their intrusion to avoid detection by the IDS. Then, we develop a theoretical framework for evaluating the security of an IDS against mimicry attacks. We show how to break the security of one published IDS with these methods, and we experimentally confirm the power of mimicry attacks by giving a worked example of an attack on a concrete IDS implementation. We conclude with a call for further research on intrusion detection from both attacker's and defender's viewpoints.
Total citations
20032004200520062007200820092010201120122013201420152016201720182019202020212022202320242639677971646640573645586147465253484334349
Scholar articles
D Wagner, P Soto - Proceedings of the 9th ACM Conference on Computer …, 2002