2006
DOI: 10.1007/11856214_11
|View full text |Cite
|
Sign up to set email alerts
|

Fast and Evasive Attacks: Highlighting the Challenges Ahead

Abstract: Abstract. Passive network monitors, known as telescopes or darknets, have been invaluable in detecting and characterizing malware outbreaks. However, as the use of such monitors becomes commonplace, it is likely that malware will evolve to actively detect and evade them. This paper highlights the threat of simple, yet effective, evasive attacks that undermine the usefulness of passive monitors. Our results raise an alarm to the research and operational communities to take proactive countermeasures before we ar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2006
2006
2013
2013

Publication Types

Select...
5
2
1

Relationship

3
5

Authors

Journals

citations
Cited by 23 publications
(11 citation statements)
references
References 19 publications
0
11
0
Order By: Relevance
“…Previous work has demonstrated the ease of detecting the location of general network sensors [10,11] through active probing. Recent work by Rajab et al [12] describes how evasive techniques can be used by malware to detect honeypots by selective sampling of the IP address space. Discrepancies in the behavior of IP network stacks can also be exploited for sensor detection, as demonstrated by shown the Honeyd detector named Winnie [13].…”
Section: Related Workmentioning
confidence: 99%
“…Previous work has demonstrated the ease of detecting the location of general network sensors [10,11] through active probing. Recent work by Rajab et al [12] describes how evasive techniques can be used by malware to detect honeypots by selective sampling of the IP address space. Discrepancies in the behavior of IP network stacks can also be exploited for sensor detection, as demonstrated by shown the Honeyd detector named Winnie [13].…”
Section: Related Workmentioning
confidence: 99%
“…Rajab et al have presented an efficient probe-response attack that can be used to discover the locations of network monitors deployed on the (wired) Internet [16]. A similar technique could potentially be applied in the context of mobile infections.…”
Section: B Evasive Wormsmentioning
confidence: 99%
“…The latter type of scan significantly reduces the burden on remote networks and is useful when a 5-10-s estimate of the number of responsive hosts (rather than their IP addresses) is required. While we do not specifically cover dynamic scope reduction (e.g., using prior scan history [46], live feedback [57], or external information [25]), our techniques may be used in conjunction with such approaches to optimally load-balance the traffic across target networks. While several large-scale measurements have been conducted in the past [6], [14], [18], [44], researchers initially considering a similar project are often faced with delays on the order of months for individual tests to run [6], [44].…”
Section: Introductionmentioning
confidence: 99%