Matryoshka: Tunneled packets breaking the rules | IEEE Conference Publication | IEEE Xplore

Matryoshka: Tunneled packets breaking the rules


Abstract:

Intrusion detection and prevention systems (IDPSs) are widely used to secure computer networks. They monitor network traffic by searching for unusual combinations in prot...Show More

Abstract:

Intrusion detection and prevention systems (IDPSs) are widely used to secure computer networks. They monitor network traffic by searching for unusual combinations in protocol headers and for malicious patterns in the packet payloads. In this paper we present "Matryoshka", a vulnerability that allows tunneled malicious packets to bypass the signature mapping procedures implemented in many industrial IDPS. Matryoshka is implemented as a tool and tested against Snort under different topologies and modes. To mitigate attacks that can be initialized using the bypassed tunneled malicious packets, a Snort preprocessor was developed and tested, and results demonstrated that all malicious tunneled packets were successfully detected. Processing overhead of the preprocessor to inspect and decapsulate tunneled packets was measured at 2% of the overall overhead of inspecting, decapsulating, and matching the malicious signature, and at 0:2% of the overall overhead of inspecting, decapsulating, assembling, and matching the signature.
Date of Conference: 04-08 July 2011
Date Added to IEEE Xplore: 25 August 2011
ISBN Information:
Conference Location: Istanbul, Turkey

Contact IEEE to Subscribe

References

References is not available for this document.