Chad R Skipper Polymorphism and Intrusion Detection Systems
Chad R. Skipper, Sr. Software Engineer - Symantec Corporation
Polymorphism and Intrusion Detection Systems
As the Internet and corporate networks continue to evolve and grow, much of the conventional wisdom associated with computer security will continue to be challenged, changed, and in some cases will become obsolete. This presentation discusses the effects of polymorphic attacks on networks. It is important to note that the polymorphic algorithms used to craft malicious attacks are specifically designed to evade common techniques used by Network Intrusion Detection Systems (NIDS). While the use of malicious polymorphic code is not new, we are beginning to see a paradigm shift from polymorphic viruses to polymorphic attacks.
This presentation will include a description of polymorphic attacks, to include the paradigm shift, encoding process, evasion techniques, TCPDump of polymorphic sessions, and the possible remedies of Intrusion Detection Systems.
Chad has eight years experience in systems engineering, network security, network design, and Internet design using various operating systems. Chad holds a Bachelors degree in Computer Information Systems, has the MCSE, MCP +I, CCNA, and Solaris Certifications. During his 4 years enlisted with the Air Force Chad built and secured several LAN and WAN networks, was involved with information systems counter intelligence, OSI investigations, information warfare, and exploit intelligence. After the Air Force Chad joined Trident Data Systems where he integrated UNIX and NT into a secure environment. Chad then joined L-3 Network Security as the Exploitation Engineer where he researched, developed, verified, documented new vulnerabilities and exploitation techniques for a variety of communications platforms. L-3 Network Security was acquired by Symantec, where today, Chad runs a signature development team for host/network based intrusion detection signatures.
Black Hat - USA - 2001 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security