skip to main content
10.1145/1143997.1144271acmconferencesArticle/Chapter ViewAbstractPublication PagesgeccoConference Proceedingsconference-collections
Article

On evolving buffer overflow attacks using genetic programming

Published:08 July 2006Publication History

ABSTRACT

In this work, we employed genetic programming to evolve a "white hat" attacker; that is to say, we evolve variants of an attack with the objective of providing better detectors. Assuming a generic buffer overflow exploit, we evolve variants of the generic attack, with the objective of evading detection by signature-based methods. To do so, we pay particular attention to the formulation of an appropriate fitness function and partnering instruction set. Moreover, by making use of the intron behavior inherent in the genetic programming paradigm, we are able to explicitly obfuscate the true intent of the code. All the resulting attacks defeat the widely used 'Snort' Intrusion Detection System.

References

  1. D. Song, M.I. Heywood, A.N. Zincir-Heywood. A Linear Genetic Programming Approach to Intrusion Detection. In Proceedings of Genetic and Evolutionary Computation Conference, GECCO, Springer-Verlag, Lecture Notes in Computer Science, 2724, pages 2325--2336, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. R. Curry, M.I. Heywood. Towards Efficient Training on Large Datasets for Genetic Programming. In Canadian Conference on Artificial Intelligence, pages 161-174, Springer-Verlag, Lecture Notes in Artificial Intelligence, 3060, May 2004.Google ScholarGoogle Scholar
  3. D. Song, M.I. Heywood, A.N. Zincir-Heywood. Training Genetic Programming On Half a Million Exemplars: An Example from Anomaly Detection, IEEE Transactions on Evolutionary Computation, 9(3): 225--239, June 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. ADMmutate. http://www.ktwu.ca/security.htmlGoogle ScholarGoogle Scholar
  5. D. Wagner, P. Soto, Mimicry Attacks on Host-based Intrusion Detection Systems, ACM Conference on Computer Security, pages 255--264. 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. K.M.C. Tan, K.S. Killourhy, R.A. Maxion, Undermining an Anomaly-based Intrusion Detection System using Common Exploits, In 5th International Symposium on Recent Advances in Intrusion Detection, pages 54--73. Lecture Notes in Computer Science, LNCS 2516, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. G. Vigna, W. Robertson, D. Balzarotti, Testing Network Based Intrusion Detection Signatures Using Mutant Exploits, In ACM Conference on Computer Security, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. IA-32 Intel, Architecture Software Developer's Manual Volumes 2A, 2B: Instruction Set Reference, A-M, M-Z, 2005Google ScholarGoogle Scholar
  9. M.I. Heywood, A.N. Zincir-Heywood. Dynamic Page Based Crossover in Linear Genetic Programming, IEEE Transactions on Systems, Man and Cybernetics - Part B, 32(3), pp 360--388, June 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. H.G. Kayacik, A.N. Zincir-Heywood, M.I. Heywood, Evolving Successful Stack Overflow Attacks for Vulnerability Testing, In 21st Annual Computer Security Applications Conference, Dec 5-9 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. G. Dozier, D. Brown, K. Cain, J. Hurley, Vulnerability analysis of immunity-based intrusion detection systems using evolutionary hackers, In Proceedings of the Genetic and Evolutionary Computation Conference, pages 263-274. Lecture Notes in Computer Science, LNCS 3102, 2004.Google ScholarGoogle Scholar
  12. J. Budynek, E. Bonabeau, B. Shargel, Evolving Computer Intrusion Scripts for Vulnerability Assessment and Log Analysis. In Proceedings of the Genetic and Evolutionary Computation Conference, pages 1905--1912. ACM SIGEVO, Volume 2, June 25-29 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. On evolving buffer overflow attacks using genetic programming

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Conferences
                GECCO '06: Proceedings of the 8th annual conference on Genetic and evolutionary computation
                July 2006
                2004 pages
                ISBN:1595931864
                DOI:10.1145/1143997

                Copyright © 2006 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 8 July 2006

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • Article

                Acceptance Rates

                GECCO '06 Paper Acceptance Rate205of446submissions,46%Overall Acceptance Rate1,669of4,410submissions,38%

                Upcoming Conference

                GECCO '24
                Genetic and Evolutionary Computation Conference
                July 14 - 18, 2024
                Melbourne , VIC , Australia

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader