@inproceedings{6792832d67ff4665950aab13566e7be1,
title = "On Emulation-Based Network Intrusion Detection Systems",
abstract = "Emulation-based network intrusion detection systems have been devised to detect the presence of shellcode in network traffic by trying to execute (portions of) the network packet payloads in an in- strumented environment and checking the execution traces for signs of shellcode activity. Emulation-based network intrusion detection systems are regarded as a significant step forward with regards to traditional signature-based systems, as they allow detecting polymorphic (i.e., en- crypted) shellcode. In this paper we investigate and test the actual effec- tiveness of emulation-based detection and show that the detection can be circumvented by employing a wide range of evasion techniques, ex- ploiting weakness that are present at all three levels in the detection process. We draw the conclusion that current emulation-based systems have limitations that allow attackers to craft generic shellcode encoders able to circumvent their detection mechanisms.",
keywords = "SCS-Cybersecurity, EC Grant Agreement nr.: FP7/607093, EWI-24965, Emulation, METIS-305975, Polymorphism, IR-91773, Evasion, IDS, Shellcode",
author = "Ali Abbasi and Jos Wetzel and Wouter Bokslag and Emmanuele Zambon and Sandro Etalle",
note = "eemcs-eprint-24965 ; 17th International Symposium on Research in Attacks, Intrusions and Defenses (RAID) ; Conference date: 17-09-2014 Through 19-09-2014",
year = "2014",
month = sep,
day = "18",
doi = "10.1007/978-3-319-11379-1\_19",
language = "Undefined",
isbn = "978-3-319-11379-1",
series = "Lecture Notes in Computer Science",
publisher = "Springer",
pages = "384--404",
booktitle = "Proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defenses (RAID)",
address = "Germany",
}