A 2012

Bruteforcing in the Shadows - Evading Automated Detection

DRAŠAR, Martin a Jan VYKOPAL

Základní údaje

Originální název

Bruteforcing in the Shadows - Evading Automated Detection

Název česky

Skrytý bruteforcing - obcházení automatické deteckce útoků

Autoři

DRAŠAR, Martin a Jan VYKOPAL

Vydání

2012

Další údaje

Jazyk

angličtina

Typ výsledku

Audiovizuální tvorba

Obor

Informatika

Stát vydavatele

Česká republika

Utajení

není předmětem státního či obchodního tajemství

Odkazy

URL, URL

Označené pro přenos do RIV

Ano

Kód RIV

RIV/00216224:14610/12:00058679

Organizace

Ústav výpočetní techniky – Masarykova univerzita – Repozitář

Klíčová slova anglicky

NetFlow;bruteforce attacks;flow stretching;evading detection;automatic detection;

Návaznosti

OVMASUN200801, projekt VaV.
Změněno: 1. 9. 2020 11:59, RNDr. Daniel Jakubík

Anotace

V originále

Networks of today face multitude of attacks of various complexities, but research of suitable defences is often done on limited or unsuitable datasets or insufficient testbeds. Therefore many proposed detection mechanisms are usable only for relatively small subsets of attacks, which significantly disturbs traffic patterns such as flooding attacks or massive port scans. At Masaryk University, which has about 15,000 networked computers, we employ a wide range of detection tools based on NetFlow, such as port scan, botnet, and brute-force attack detectors. Their initial versions proved to be useful for detecting attacks that generate significant behavioral changes in traffic patterns. However we have found that there are several techniques to lessen the behavioral impact and in effect to hide an attack from the detection mechanisms. In our presentation we will discuss three such techniques. The first one restricts the number of attempts in a given time window under the detection threshold. The second and the third ones mimic legitimate traffic either by inserting irregular delays between individual attack attempts or by exploiting features of protocols to create the illusion of legitimate traffic. These methods are inexpensive to implement, but they can be very effective for evading detection. Therefore we would like to raise awareness about them and their importance for designing new detection methods.
Zobrazeno: 3. 5. 2026 03:21