Evolving TCP/IP packets: A case study of port scans

P. LaRoche, A. N. Zincir-Heywood, M. Heywood
{"title":"Evolving TCP/IP packets: A case study of port scans","authors":"P. LaRoche, A. N. Zincir-Heywood, M. Heywood","doi":"10.1109/CISDA.2009.5356541","DOIUrl":null,"url":null,"abstract":"In this work, we investigate the ability of genetic programming techniques to evolve valid network packets, including all relevant header values, towards a specific goal. We see this as a first step in building a fuzzing system that can learn to adapt for vulnerability analysis. By developing a system that learns the packets that are required to be transmitted towards targets, using feedback from an external network source, we make a step towards having a system that can intelligently explore the capabilities of a given security system. In order to validate our system's capabilities we evolve a variety of port scan patterns while running the packets through an IDS, with the goal to minimizes the alarms raised during the scanning process. Results show that the system not only successfully evolves valid TCP packets, but also remains stealthy in its activity.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"2 1","pages":"1-8"},"PeriodicalIF":0.0000,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CISDA.2009.5356541","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13

Abstract

In this work, we investigate the ability of genetic programming techniques to evolve valid network packets, including all relevant header values, towards a specific goal. We see this as a first step in building a fuzzing system that can learn to adapt for vulnerability analysis. By developing a system that learns the packets that are required to be transmitted towards targets, using feedback from an external network source, we make a step towards having a system that can intelligently explore the capabilities of a given security system. In order to validate our system's capabilities we evolve a variety of port scan patterns while running the packets through an IDS, with the goal to minimizes the alarms raised during the scanning process. Results show that the system not only successfully evolves valid TCP packets, but also remains stealthy in its activity.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
不断发展的TCP/IP数据包:端口扫描的案例研究
在这项工作中,我们研究了遗传编程技术进化有效网络数据包的能力,包括所有相关的报头值,以实现特定目标。我们认为这是建立模糊测试系统的第一步,该系统可以学习适应脆弱性分析。通过开发一个系统来学习需要向目标传输的数据包,使用来自外部网络源的反馈,我们向拥有一个可以智能地探索给定安全系统功能的系统迈出了一步。为了验证系统的功能,我们在通过IDS运行数据包时开发了各种端口扫描模式,目的是尽量减少扫描过程中产生的警报。结果表明,该系统不仅能够成功地演化出有效的TCP数据包,而且在其活动中保持了隐身性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Evolving spiking neural networks: A novel growth algorithm corrects the teacher Emitter geolocation using low-accuracy direction-finding sensors Secure two and multi-party association rule mining Passive multitarget tracking using transmitters of opportunity Bias phenomenon and analysis of a nonlinear transformation in a mobile passive sensor network
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1