usenix conference policies
You are here
Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics
A fundamental problem for network intrusion detection systems is the ability of a skilled attacker to evade detection by exploiting ambiguities in the traffic stream as seen by the monitor. We discuss the viability of addressing this problem by introducing a new network forwarding element called a traffic normalizer. The normalizer sits directly in the path of traffic into a site and patches up the packet stream to eliminate potential ambiguities before the traffic is seen by the monitor, removing evasion opportunities. We examine a number of tradeoffs in designing a normalizer, emphasizing the important question of the degree to which normalizations undermine end-to-end protocol semantics. We discuss the key practical issues of ``cold start'' and attacks on the normalizer, and develop a methodology for systematically examining the ambiguities present in a protocol based on walking the protocol's header. We then present norm, a publicly available user-level implementation of a normalizer that can normalize a TCP traffic stream at 100,000 pkts/sec in memory-to-memory copies, suggesting that a kernel implementation using PC hardware could keep pace with a bidirectional 100 Mbps link with sufficient headroom to weather a high-speed flooding attack of small packets.
author = {Mark Handley and Vern Paxson and Christian Kreibich},
title = {Network Intrusion Detection: Evasion, Traffic Normalization, and {End-to-End} Protocol Semantics},
booktitle = {10th USENIX Security Symposium (USENIX Security 01)},
year = {2001},
address = {Washington, D.C.},
url = {https://www.usenix.org/conference/10th-usenix-security-symposium/network-intrusion-detection-evasion-traffic-normalization},
publisher = {USENIX Association},
month = aug
}
connect with us