Module 6 - Intrusion Detection System
Module 6 - Intrusion Detection System
Malware Analytics
Intrusion Detection System
An Intrusion Detection System( IDS) is a
wall of defense to confront the attacks of
computer systems on the internet.
The main assumption of the IDS is that the
behavior of intruders is different from legal
users.
What is an intrusion detection system?
Intrusion
Encryption Firewalls Detection
Systems (IDS)
Network Virus
…
IDS Scanners
The duration of time that the detector can maintain a state of traffic
might be smaller than the period that the destination host can maintain
a state of traffic
Flooding
The attacker begins the attack to overwhelm the
detector and this causes a failure of control
mechanism.
When the detector fails, all traffic would be
allowed
A popular method to create a flooding situation is
spoofing the legitimate User Datagram Protocol
(UDP) and Internet Control Message Protocol
(ICMP).
The traffic flooding is used to disguise the
abnormal activities of the cybercriminal.
Therefore, IDS would have extreme difficulty to
find malicious packets in a huge amount of traffic.
Obfuscation
Obfuscation techniques can be used to evade detection, which are the
techniques of concealing an attack by making the message difficult to
understand
The terminology of obfuscation means changing the program code in a way
that keeps it functionally identical with the aim to reduce detectability to
any kind of static analysis or reverse engineering process and making it
obscure and less readable. This obfuscation of malware enables it to evade
current IDS.
Obfuscation attempts to utilize any limitations in the signature database
and its capability to duplicate the way the computer host examines
computer's data
An effective IDS should be supporting the hexadecimal encoding format
or having these hexadecimal strings in its set of attack signatures
Unicode/UTF-8 standard permits one character to be symbolized in
several various formats. Cybercriminals may also use double-encoded data,
exponentially escalating the number of signatures required to detect the
attack.
SIDS relies on signature matching to identify malware where the signatures
are created by human experts by translating a malware from machine code
into a symbolic language such as Unicode. However, the use of code
obfuscation is very valuable for cybercriminals to avoid IDSs.
Encryption
Generally, encryption offers a number of security services,
such as data confidentiality, integrity, and privacy.
Malware authors employ these security attributes to escape
detection and conceal attacks that may target a computer
system.
For example, attacks on encrypted protocols such as
HyperText Transfer Protocol Secure (HTTPS) cannot be read
by an IDS
The IDS cannot match the encrypted traffic to the existing
Database signatures if it doesn't interpret the encrypted
traffic.
Therefore, examining encrypted traffic makes it difficult for
detectors to detect attacks
For example, packet content-based features have been
applied extensively to identify malware from normal traffic,
which cannot readily be applied if the packet is encrypted.
Challenge of IDS on intrusion
evasion detection
Detecting attacks masked by evasion techniques is a
challenge for both SIDS and AIDS.
The ability of evasion techniques would be determined by
the ability of IDS to bring back the original signature of the
attacks or create new signatures to cover the modification of
the attacks.
Robustness of IDS to various evasion techniques still needs
further investigation. For example, SIDS in regular
expressions can detect the deviations from simple mutation
such as manipulating space characters, but they are still
useless against a number of encryption techniques.
Summary
Cybercriminals are targeting computer users by using
sophisticated techniques as well as social engineering
strategies.
Cybercriminals have shown their capability to obscure their
identities, hide their communication, distance their identities
from illegal profits, and use infrastructure that is resistant to
compromise.
Therefore, it becomes increasingly important for computer
systems to be protected using advanced intrusion detection
systems that are capable of detecting modern malware.
In order to design and build such IDS systems, it is necessary
to have a complete overview of the strengths and limitations
of contemporary IDS research.