2014
DOI: 10.1007/978-3-319-11379-1_19
|View full text |Cite
|
Sign up to set email alerts
|

On Emulation-Based Network Intrusion Detection Systems

Abstract: Abstract. Emulation-based network intrusion detection systems have been devised to detect the presence of shellcode in network traffic by trying to execute (portions of) the network packet payloads in an instrumented environment and checking the execution traces for signs of shellcode activity. Emulation-based network intrusion detection systems are regarded as a significant step forward with regards to traditional signature-based systems, as they allow detecting polymorphic (i.e., encrypted) shellcode. In thi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 17 publications
0
7
0
Order By: Relevance
“…Accuracy Rate on KDDTest+ Abbasi, et al [31] 77.38% Panda, et al [32] 81.47% Abbasi, et al [31] 79.66% Proposed Technique 83.24%…”
Section: Researchmentioning
confidence: 99%
“…Accuracy Rate on KDDTest+ Abbasi, et al [31] 77.38% Panda, et al [32] 81.47% Abbasi, et al [31] 79.66% Proposed Technique 83.24%…”
Section: Researchmentioning
confidence: 99%
“…Recently, Abbasi et. al., [8] propose a number of techniques that evade emulated-based shellcode detection system (EBSDS). They point out that any emulation gaps should lead to the exposure of emulator to the attackers, and summarize the limitations of emulator in two aspects: a) Unsupported Instruction: Most EBSDSs do not have the capabilities of emulating full instruction set.…”
Section: Related Workmentioning
confidence: 99%
“…For an attacker the ultimate objective when attacking an industrial control network is to manipulate the physical process without being detected [1] by advanced intrusion detection systems (IDS) or plant operators. Before the highly publicized Stuxnet malware, most of the attacks were trivial intrusions against the IT equipment of industrial control network.…”
Section: Introductionmentioning
confidence: 99%