Detecting evasion attacks at high speeds without reassembly

G Varghese, JA Fingerhut, F Bonomi - Proceedings of the 2006 …, 2006 - dl.acm.org
G Varghese, JA Fingerhut, F Bonomi
Proceedings of the 2006 conference on Applications, technologies …, 2006dl.acm.org
Ptacek and Newsham [14] showed how to evade signature detection at Intrusion Prevention
Systems (IPS) using TCP and IP Fragmentation. These attacks are implemented in tools like
FragRoute, and are institutionalized in IPS product tests. The classic defense is for the IPS to
reassemble TCP and IP packets, and to consistently normalize the output stream. Current
IPS standards require keeping state for 1 million connections. Both the state and processing
requirements of reassembly and normalization are barriers to scalability for an IPS at speeds …
Ptacek and Newsham [14] showed how to evade signature detection at Intrusion Prevention Systems (IPS) using TCP and IP Fragmentation. These attacks are implemented in tools like FragRoute, and are institutionalized in IPS product tests. The classic defense is for the IPS to reassemble TCP and IP packets,and to consistently normalize the output stream. Current IPS standards require keeping state for 1 million connections. Both the state and processing requirements of reassembly and normalization are barriers to scalability for an IPS at speeds higher than 10 Gbps.In this paper, we suggest breaking with this paradigm using an approach we call Split-Detect. We focus on the simplest form of signature, an exact string match, and start by splitting the signature into pieces. By doing so the attacker is either forced to include at least one piece completely in a packet, or to display potentially abnormal behavior (e.g., several small TCP fragments or out-of-order packets) that cause the attacker's flow to be diverted to a slow path. We prove that under certain assumptions this scheme can detect all byte-string evasions. We also show using real traces that the processing and storage requirements of this scheme can be 10% of that required by a conventional IPS, allowing reasonable cost implementations at 20 Gbps. While the changes required by Split-Detect may be a barrier to adoption, this paper exposes the assumptions that must be changed to avoid normalization and reassembly in the fast path.
ACM Digital Library
Showing the best result for this search. See all results