"Towards a science of anomaly detection system evasion"
Title | "Towards a science of anomaly detection system evasion" |
Publication Type | Conference Paper |
Year of Publication | 2015 |
Authors | M. Q. Ali, A. B. Ashfaq, E. Al-Shaer, Q. Duan |
Conference Name | 2015 IEEE Conference on Communications and Network Security (CNS) |
Date Published | Sept |
Publisher | IEEE |
ISBN Number | 978-1-4673-7876-5 |
Accession Number | 15651986 |
Keywords | advanced persistent threat, anomaly detection system evasion, computer network security, Detectors, Entropy, Estimation, evade detection, Grippers, Intrusion detection, intrusion detection system, key based randomization scheme, launch evasion attack, parameter estimation, parameter estimation attacks, pubcrawl170101 |
Abstract | A fundamental drawback of current anomaly detection systems (ADSs) is the ability of a skilled attacker to evade detection. This is due to the flawed assumption that an attacker does not have any information about an ADS. Advanced persistent threats that are capable of monitoring network behavior can always estimate some information about ADSs which makes these ADSs susceptible to evasion attacks. Hence in this paper, we first assume the role of an attacker to launch evasion attacks on anomaly detection systems. We show that the ADSs can be completely paralyzed by parameter estimation attacks. We then present a mathematical model to measure evasion margin with the aim to understand the science of evasion due to ADS design. Finally, to minimize the evasion margin, we propose a key-based randomization scheme for existing ADSs and discuss its robustness against evasion attacks. Case studies are presented to illustrate the design methodology and extensive experimentation is performed to corroborate the results. |
URL | http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7346858&isnumber=7346791 |
DOI | 10.1109/CNS.2015.7346858 |
Citation Key | 7346858 |
- advanced persistent threat
- anomaly detection system evasion
- computer network security
- Detectors
- Entropy
- estimation
- evade detection
- Grippers
- Intrusion Detection
- intrusion detection system
- key based randomization scheme
- launch evasion attack
- parameter estimation
- parameter estimation attacks
- pubcrawl170101