Firewalls & Detection Evasions Flashcards
stateless firewall
packet filter: examine packet at network layer (L4)
decision based on packet header IP, port, flags
+ application independent, performance and scalability
- no state or application context
stateful firewall
decision also based on session state
+more powerful rules
- state for udp?, state explosion
next gen. firewall
- NGFW
- deep packet inspection
- take application and protocol state into account for security decision
+ application and protocol awareness - need to support many application protocols
- perf. and scalability
accuracy vs. precision
precision: values of repeated mes. are clustered
accuracy: how close measured values are to the target
multiple detectors
parallel composition: either A or B triggers allert (A or B) -> inc. false positive
serical composition: both A and B must trigger for alert (A and B) -> inc. false negative
signatures
use information of previous attacks to detect suspicious behaviour
1d: blacklist/whitelist
2d: regular expression functions and string matching
nd: threshold of good or bad activities classifies behaviour
sandboxing
run suspicious program in isolated environment and check behaviour
+proactive, no signature updates
-resource intensive, high latency
machine learning
supervised: analyze labeled data (good/bad)
unsupervised: classify unlabeled data
Firewall Attacks
- IP Source Spoofing: spoof source IP address to bypass filters (ineff. for TCP)
- artificial fragmentation: fragment packets to bypass rules
- Dos: provoke state explosion at FW
- Tunneling: data in ICMP ping packets or DNS requests / VPN channel
- encodings: different encodings or addition of noise
Protectors
- detect use of debuggers or virtualization
- if seen, malware causes different operation
Crypter
- encrypt malware so that signature detection systems and static analysis are ineffectual
packers
- make malware smaller and more portable
- binary is structurally different every time packed version is executed
polymorphism techniques
- swap equivalent code
- change order of code
- insert noise
- compiler modulation
binder
embed maleware into other software
why was stuxnet not detected by antivirus
AV only detects known malware