Evolving Buffer Overflow Attacks with Detector Feedback

  • Authors:
  • H. Gunes Kayacik;Malcolm Iain Heywood;A. Nur Zincir-Heywood

  • Affiliations:
  • Faculty of Computer Science, Dalhousie University, 6050 University Avenue. Halifax. NS., Canada;Faculty of Computer Science, Dalhousie University, 6050 University Avenue. Halifax. NS., Canada;Faculty of Computer Science, Dalhousie University, 6050 University Avenue. Halifax. NS., Canada

  • Venue:
  • Proceedings of the 2007 EvoWorkshops 2007 on EvoCoMnet, EvoFIN, EvoIASP,EvoINTERACTION, EvoMUSART, EvoSTOC and EvoTransLog: Applications of Evolutionary Computing
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

A mimicry attack is an exploit in which basic behavioral objectives of a minimalist 'core' attack are used to design multiple attacks achieving the same objective from the same application. Research in mimicry attacks is valuable in determining and eliminating detector weaknesses. In this work, we provide a process for evolving all components of a mimicry attack relative to the Stide (anomaly) detector under a Traceroute exploit. To do so, feedback from the detector is directly incorporated into the fitness function, thus guiding evolution towards potential blind spots in the detector. Results indicate that we are able to evolve mimicry attacks that reduce the detector anomaly rate from ~67% of the original core exploit, to less than 3%, effectively making the attack indistinguishable from normal behaviors.