HOME

TheInfoList



OR:

In network security, evasion is bypassing an information security defense in order to deliver an
exploit Exploit means to take advantage of something (a person, situation, etc.) for one's own end, especially unethically or unjustifiably. Exploit can mean: * Exploitation of natural resources *Exploit (computer security) * Video game exploit *Exploita ...
,
attack Attack may refer to: Warfare and combat * Offensive (military) * Charge (warfare) * Attack (fencing) * Strike (attack) * Attack (computing) * Attack aircraft Books and publishing * ''The Attack'' (novel), a book * '' Attack No. 1'', comic an ...
, or other form of
malware Malware (a portmanteau for ''malicious software'') is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, depri ...
to a target network or system, without detection. Evasions are typically used to counter network-based intrusion detection and prevention systems (IPS, IDS) but can also be used to by-pass firewalls and defeat malware analysis. A further target of evasions can be to crash a network security defense, rendering it in-effective to subsequent targeted attacks.


Description

Evasions can be particularly nasty because a well-planned and implemented evasion can enable full sessions to be carried forth in packets that evade an IDS. Attacks carried in such sessions will happen right under the nose of the network and service administrators. The security systems are rendered ineffective against well-designed evasion techniques, in the same way a stealth fighter can attack without detection by radar and other defensive systems. A good analogy to evasions is a system designed to recognize keywords in speech patterns on a phone system, such as “break into system X”. A simple evasion would be to use a language other than English, but which both parties can still understand, and wishfully a language that as few people as possible can talk.


Evasion attacks

Various advanced and targeted evasion attacks have been known since the mid-1990s: * A seminal text describing the attacks against IDS systems appeared in 1997.50 Ways to Defeat Your Intrusion Detection System
/ref> * One of the first comprehensive description of attacks was reported by Ptacek and Newsham in a technical report in 1998.Ptacek, Newsham: Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection, Technical report, 1998. * In 1998, also an article in the Phrack Magazine describes ways to by-pass network intrusion detection.
/ref>


Reports

The 1997 article mostly discusses various shell-scripting and character-based tricks to fool an IDS. The Phrack Magazine article and the technical report from Ptacek et al. discusses TCP/IP protocol exploits, evasions and others. More recent discussions on evasions include the report by Kevin Timm.IDS Evasion Techniques and Tactics
/ref>


Protecting against evasions

The challenge in protecting servers from evasions is to model the end-host operation at the network security device, i.e., the device should be able to know how the target host would interpret the traffic, and if it would be harmful, or not. A key solution in protecting against evasions is traffic normalization at the IDS/IPS device. The other way separation internet access can be implemented based on how endpoint user can be safe accessing the internet segment.M. Handley, V. Paxson, C. Kreibich, Network intrusion detection: evasion, traffic normalization, and end-to-end protocol semantics, Usenix Security Symposium, 2001. Lately there has been discussions on putting more effort on research in evasion techniques. A presentation at
Hack.lu hack.lu (also written as HACKLU) is a yearly computer security conference held in Luxembourg that brings together a variety of people interested in information security. It's organized by the Computer Incident Response Center Luxembourg (CIRCL), ...
discussed some potentially new evasion techniques and how to apply multiple evasion techniques to by-pass network security devices.


See also

* Metasploit Project


References

* Singh, Abhishek. "Evasions In Intrusion Prevention Detection Systems". Virus Bulletin. Retrieved 1 April 2010. {{DEFAULTSORT:Evasion (Network Security) Computer security exploits