Lucian Constantin
CSO Senior Writer

Stonesoft identifies new ways to evade intrusion detection systems

news
Oct 11, 20113 mins

Finnish security firm's advanced evasion techniques have been confirmed to bypass the signatures of multiple IDPS products currently available

Finnish security firm Stonesoft claims to have developed 163 new attack methods that can evade network intrusion detection and prevention systems (IDPS) over multiple communication protocols including IPv4, IPv6, TCP, and HTTP.

The company calls these methods advanced evasion techniques (AETs), a term it coined last year when it released a similar set of samples.

[ Learn how to greatly reduce the threat of malicious attacks with InfoWorld’s Insider Threat Deep Dive PDF special report. | Stay up to date on the latest security developments with InfoWorld’s Security Central newsletter. ]

Stonesoft’s new AETs consist of 54 unique evasions and 109 combinations that have been confirmed to bypass the signatures of multiple IDPS products currently available on the market.

Intrusion detection and prevention systems consist of software applications commonly running on dedicated hardware, that monitor network traffic with the purpose of detecting malicious activity and blocking it.

Similar to antivirus products which use malware definitions to block threats, IDPS solutions use attack signatures to detect network intrusion attempts.

It’s been known for a long time that signature-based implementations can be defeated by determined attackers; that’s the reason why modern antivirus products provide multiple layers of protection.

However, intrusion prevention systems are less flexible and cannot compensate for detection evasion as easily as anti-malware solutions. In fact, Stonesoft claims that many vendors haven’t even addressed the AETs its researchers identified last year.

“Network security vendors have now had more than a year to provide their customers protection against AETs, but unfortunately we still have not seen much success in this area,” Stonesoft’s founder and CEO, Ilkka Hiidenheimo, said.

“Very few vendors have truly understood the magnitude of the problem, while some are struggling to provide some kind of protection. Most of the vendors who acknowledge the problem are incapable of building a working solution — instead, they are keeping themselves busy doing temporary and inflexible fixes. The rest just ignore the issue and do nothing,” he added.

A basic detection evasion technique is to modify an attack to work over a different protocol or to implement it using a different programming language. Most IDPS products are smart enough to catch onto such rudimentary attempts; however, Stonesoft’s AETs combine multiple techniques into new attack vectors that look completely unknown to existing solutions.

The company submitted its new set of AET samples to the Finnish national computer security incident response team (CERT-FI) in order to coordinate patching processes with the affected vendors. Whether this effort will have better results than last year’s remains to be seen.

However, it’s worth keeping in mind that AETs are about delivering payloads and nothing stops the payload itself from being blocked by a security solution running at the system level.

Lucian Constantin

Lucian Constantin writes about information security, privacy, and data protection for CSO. Before joining CSO in 2019, Lucian was a freelance writer for VICE Motherboard, Security Boulevard, Forbes, and The New Stack. Earlier in his career, he was an information security correspondent for the IDG News Service and Information security news editor for Softpedia.

Before he became a journalist, Lucian worked as a system and network administrator. He enjoys attending security conferences and delving into interesting research papers. He lives and works in Romania.

You can reach him at lucian_constantin@foundryco.com or @lconstantin on X. For encrypted email, his PGP key's fingerprint is: 7A66 4901 5CDA 844E 8C6D 04D5 2BB4 6332 FC52 6D42

More from this author