AGENT: Attack Generation for NIDS Testing
The problem: The goal of a Network Intrusion Detection System (NIDS) is to alert a system administrator each time an intruder tries to penetrate the network. A misuse NIDS defines attacks via a table of malicious signatures: if an ongoing activity matches a signature in the table, an alarm is raised. Thousands of organizations depend upon such systems because they are simple to understand, enable administrators to customize the signature database, and provide concrete information about the events that have occurred.
Unfortunately, research and experience have shown
that
attackers can effectively elude almost any NIDS. Attackers can hide an
attack in
two fundamentals ways. First, they can change the way the attack is
delivered,
for example, by splitting the attack into many network packets. Second,
they
can alter the attack payload so that it no longer matches the NIDS
signature,
for example, by using a different encoding for URLs.
Our approach: We observe that variants of the same attack can be methodically computed, or derived, from each other. We formalize this observation using natural deduction to define an attack derivation model. Our model comprises a set of transformation rules, each rule represents an atomic transformation the attacker can use to hide the attack signature, and an exemplary instance of the attack from which we derive all other instances using any combination of the rules.
Based on this formal model we built AGENT, which addresses two problems:
AGENT is capable of handling the two problems. To deal with the black hat problem, AGENT uses the attack derivation model to generate attack instances and feeds these instances into the given NIDS until it finds one that is undetected. To deal with the white hat problem, AGENT uses the model to check whether the given instance matches one of the instances generated.
Availability: AGENT is available upon request.
People:
Publication:
1. S. Rubin, S. Jha, and B. P. Miller. Automatic generation and analysis of NIDS attacks. In the Annual Computer Security Applications Conference (Tucson, AZ, December 2004). (pdf). This paper won the Student Paper Award and the Best Paper Award in ACSAC 2004.
Funding: