2009 International Conference on E-Business and Information System Security 2009
DOI: 10.1109/ebiss.2009.5137874
|View full text |Cite
|
Sign up to set email alerts
|

A Hybrid Detection Approach for Zero-Day Polymorphic Shellcodes

Abstract: Zero-day shellcodes has become a major threat to the Internet with complex obfuscation techniques. However, even the state-of-the-art NIDS has small chances of detecting them because they rely on known signatures. This paper presents Hybrid Detection for zero-day Polymorphic Shellcodes (HDPS) against shellcodes using various obfuscations. Our approach employs a heuristic approach to detect return address and filter mass innocent network flows, and then constructs a Markov Model to detect the existence and loca… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…Another important category of worm quarantine is content‐based, which tries to search Shellcode in exploiting packets (Toth and Kruegel, 2002; Chen et al , 2009). In theory, content‐based techniques are accurate to pinpoint worm packets, whereas these techniques are always resources‐consuming and time‐consuming.…”
Section: Related Workmentioning
confidence: 99%
“…Another important category of worm quarantine is content‐based, which tries to search Shellcode in exploiting packets (Toth and Kruegel, 2002; Chen et al , 2009). In theory, content‐based techniques are accurate to pinpoint worm packets, whereas these techniques are always resources‐consuming and time‐consuming.…”
Section: Related Workmentioning
confidence: 99%
“…However, due to the complexity the network applications [5], and the strong ability of metamorphism and concealment [6], those methods have low accuracy. Content analysis [7] is a kind of methods which attempts to detect the common features in abnormal traffic. For example, executable feature [8], pad instructions [9], self-decryption routine [10] and so on.…”
Section: Related Workmentioning
confidence: 99%