Jump to content
Nytro

Evading network-level emulation

Recommended Posts

Posted

Evading network-level emulation

Piotr Bania

bania.piotr @ gmail.com

April 2009

Abstract

Recently more and more attention has been paid to

the intrusion detection systems (IDS) which don't

rely on signature based detection approach. Such

solutions try to increase their defense level by using

heuristics detection methods like network-level emulation.

This technique allows the intrusion detection

systems to stop unknown threats, which normally

couldn't be stopped by standard signature

detection techniques.

In this article author will describe general concepts

of network-level emulation technique including

its advantages and disadvantages (weak sides)

together with providing potential countermeasures

against this type of detection method.

Download:

http://piotrbania.com/all/articles/pbania-evading-nemu2009.pdf

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...