SlideShare a Scribd company logo
Identify, prevent and secure against
       the unidentifiable attacks


Presented by:
Dr Steven Turner, VP of Optimisation, Intergence

Alan Cottom, CISSP, Solutions Architect, Stonesoft
Optimising your connected world.



Thank you for joining our webinar
•   Please note
     • During this webinar, we will be using Audio Broadcast. The small
       box in the right hand corner will need to remain open throughout
•   To chat to the host
     • click on the speech bubble in the top right hand corner, then type
       in the text box
•   To submit a question
     • click on the question mark in the top right hand corner and open the
       Q&A box
•   Experiencing technical difficulties?
     • please email news@intergence.com or speak to us directly through
       the chat bar
Optimising your connected world.



Agenda
The webinar has three parts

Alan Cottom; Advanced Evasion Techniques; are you
protected?

Steve Turner; Hyperglance live demo

Q&A section
Advanced Evasion
Techniques (AET)
Are you protected?



Alan Cottom – Solutions Architect, Stonesoft
Physical & Virtual Security Appliances
Evasion (definition)
 Evasion techniques are a means to          disguise and/or
   modify cyber attacks to avoid detection and blocking by
   information security systems. Evasions enable advanced and
   hostile cyber criminals to deliver any malicious content,
   exploit or attack to a vulnerable system without
    detection, that would normally be detected and stopped.
 Security systems are rendered ineffective against such
   evasion techniques. (In the same way a stealth fighter can attack without
   detection by radar and other defensive systems)
Evasion timeline
             • First papers appeared detailing attacks against or
               ways to bypass network intrusion detection.
   1997-98


             • Possibility to combine evasions suggested
    2004


             • 12 (or so) known “traditional” evasion methods
             • Stonesoft R&D begin research
    2007
Evasion timeline
           • Stonesoft share findings on new evasion threat
           • Stonesoft deliver 23 STACKABLE AETs to CERT
   2010

           • February – Stonesoft deliver 124 new AETs
           • October – Stonesoft deliver further 160 new AETs
   2011

           • Approx. 2^300 Advanced Evasion Techniques
   Today
Advanced Evasion Techniques (AET)
 What are they?
   Any technique used to implement network based attacks in order to
   evade and bypass security detection


 What makes them advanced?
   Combination of evasions working simultaneously on multiple protocol
   layers
   Combination of evasions that can change during the attack
   Carefully designed to evade inspection


 Typically, AETs are used as part of Advanced
 Persistent Threats (APT)
   APT = Motivation – i.e. we want to target you or your organisation
   AET = Method – i.e. the way in which we will attempt to gain entry
Surely my current IPS/IDS/NGFW
can stop them?
 Stonesoft have run tests against all of the highest ranked security devices
 from the Gartner Magic Quadrant

 It is possible to effortlessly evade most market-leading security solutions by
 using one or more advanced evasion techniques (AETs).

 All products are running the latest versions and updates.

 StoneGate products were originally vulnerable but now include
 comprehensive protection against AETs as standard.
AETs in action
                                  AET Test Environment


  Untrusted Network                   Security Device(s)   Protected Network




                [Exploit with AETs]




       Predator                                                  Target
     [AET Attack]                                             [Vulnerable]
         Tool                                                     Host

                                       Gartner Magic
                                        Quadrant
                                      IPS/IDS/NGFW
                                         Solutions
AETs in action…

     AET Demonstration
Protection Against AETs
Multi-layer Traffic Normalization
• StoneGate IPS decodes and normalizes traffic
  for inspection on all protocol layers.
• Fingerprints detect exploits in the normalized
  data stream.

Dynamic Protection
• StoneGate IPS software upgrades update the
  Layered Normalization on all protocol layers.
• When new Anti-Evasion updates are available,
  the StoneGate Management Center can
  upgrade IPS engines remotely.
Vertical Inspection of the data traffic
Packet, segment or pseudo -packet based inspection process


                               Maximum Inspection Space

Data Traffic


Application
Protocol layers                             3
(Streams)



                                            2

TCP level
Segments,
pseudo packets
                                            1


 IP level
 Packets



        Limited Protocol                        Partial or No Evasion Removal                 Detect and Block Exploits
1       decoding and inspection         2       Majority of the traffic is left without   3   Unreliable or impossible exploit detection
        capability to gain speed.               evasion removal and inspected with            when evasion are not removed on all layers.
                                                limited context information available.
Horizontal
Data stream based, full Stack normalization and inspection process




Data Traffic
                                                                  …Continuous Inspection Space…



Application
Protocol level
(Streams)                                  1                       2                       3                       4



TCP level
Segments,                                  1
pseudo packets




 IP level
 Packets                                    1

       Normalize traffic on all       Advanced Evasion                      Detect exploits from the fully       Alert and report
                                                                                                             4   Evasion attacks
1      protocol layers as a       2   removal process makes the        3    evasion free data stream.
       continious process.            traffic evasion free and                                                   through management
                                      exploits detectable.                                                       system
Stonesoft AET Differentiators
Stonesoft FW / IPS                         Description
Full-stack visibility                      Stonesoft decodes and normalizes traffic on all protocol layers

Normalization based evasion removal        Normalization process remove the evasions before the data
                                           stream inspection

Horizontal data stream-based inspection    Vulnerability based fingerprints detect exploits in the
                                           normalized data stream

Inhouse evasion research and tools         Evasion-proof product quality assured with automated evasion
                                           fuzzing tests (PREDATOR)

Built-in evasion recognition and logging   Anomaly and evasion information included into threat context



Dynamic updates & upgrades                 Antievasion technology automatically updated to Next-
                                           Generation IPS and Firewall engines
AERT - Advanced Evasion Readiness Test
AETs - Comment

“Advanced Evasion            “If the network security       “Recent research indicates
Techniques can evade         system misses any type of      that Advanced Evasion
many network security        evasion it means a hacker      Techniques are real and
systems. We were able to     can use an entire class of     credible – not to mention
validate Stonesoft’s         exploits to circumvent         growing –a growing threat
research and believe that    security products,             against the network security
these Advanced Evasion       rendering them virtually       infrastructure that protects
Techniques can result in     useless. Advanced Evasion      governments, commerce and
lost corporate assets with   Techniques increase the        information-sharing
potentially serious          potential of evasion success   worldwide. Network security
consequences for breached    against the IPS, which         vendors need to devote the
organizations.”              creates a serious concern      research and resources to
                             for today’s networks.”         finding a solution.“
– Jack Walsh, Program
Manager                      – Rick Moy, President          – Bob Walder, Research
                                                            Director
alan.cottom@stonesoft.com
www.stonesoft.com
Optimising your connected world.




DEMONSTRATION
Optimising your connected world.




Q&A


      Any Questions?
Optimising your connected world.




Thank You for attending!
If you require more information or would like to book
a one to one demo :

contact us at +44 (0)845 226 4167
or drop us an email at contact@intergence.com

Or come along to our Executive Seminars across the
UK! Visit our website for more information!

More Related Content

PPTX
Core security utcpresentation962012
PPS
Stanford Cybersecurity January 2009
PDF
50120140501013
PPTX
Detecting Evasive Malware in Sandbox
PDF
Using Machine Learning in Networks Intrusion Detection Systems
PDF
Symantec Endpoint Protection 12
PDF
Anti evasion and evader - klaus majewski
PPT
Day1
Core security utcpresentation962012
Stanford Cybersecurity January 2009
50120140501013
Detecting Evasive Malware in Sandbox
Using Machine Learning in Networks Intrusion Detection Systems
Symantec Endpoint Protection 12
Anti evasion and evader - klaus majewski
Day1

What's hot (20)

PPTX
Understand How Machine Learning Defends Against Zero-Day Threats
PPT
Day4
PDF
IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)
PPTX
Where Are All The ICS Attacks?
PPTX
Evading & Bypassing Anti-Malware applications using metasploit
PPTX
NFC: Naked Fried Chicken / Пентест NFC — вот что я люблю
PDF
eForensics Free Magazine 01.12. teaser
PDF
Some things about LAN device detection
PPTX
Master Serial Killer - DEF CON 22 - ICS Village
PDF
Machine learning cybersecurity boon or boondoggle
PDF
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
PDF
Detecting Hacks: Anomaly Detection on Networking Data
PDF
Monitoring ICS Communications
PDF
Native Code Execution Control for Attack Mitigation on Android
PDF
Recomended ip telephony architecture
PDF
Mission Critical Security in a Post-Stuxnet World Part 2
PDF
[GITSN] wireless data security system
PDF
DEF CON 23 - NSM 101 for ICS
PPTX
Vulnerability Inheritance in ICS (English)
PPTX
Network Intrusion Prevention by Configuring ACLs on the Routers, based on Sno...
Understand How Machine Learning Defends Against Zero-Day Threats
Day4
IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)
Where Are All The ICS Attacks?
Evading & Bypassing Anti-Malware applications using metasploit
NFC: Naked Fried Chicken / Пентест NFC — вот что я люблю
eForensics Free Magazine 01.12. teaser
Some things about LAN device detection
Master Serial Killer - DEF CON 22 - ICS Village
Machine learning cybersecurity boon or boondoggle
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
Detecting Hacks: Anomaly Detection on Networking Data
Monitoring ICS Communications
Native Code Execution Control for Attack Mitigation on Android
Recomended ip telephony architecture
Mission Critical Security in a Post-Stuxnet World Part 2
[GITSN] wireless data security system
DEF CON 23 - NSM 101 for ICS
Vulnerability Inheritance in ICS (English)
Network Intrusion Prevention by Configuring ACLs on the Routers, based on Sno...
Ad

Viewers also liked (20)

PDF
IEC(МЭК). Разработка стандартов.
PDF
The World This Week - 18th - 22nd April, 2016
PDF
The World This Week - 14th to 18th March, 2016
PDF
01 tec ufro
PDF
vanderLaan
PDF
Sales Enablement Strategies
DOCX
Carol reid resume_medical
PPTX
[FR] Cercle Premier RSE : COP 21, comment le digital peut aider ? #CercleRSE
PPT
Conceptualizacion de la Planificacion. monicaparra
PPTX
Escuela superior politécnica de chimborazo
DOCX
ResumeofJosephAmato.docx
PDF
PgM ITTOs
PDF
Mark Perriam Profile
PDF
ASTM. Вступление страны в ВТО с точки зрения организации, разрабатывающей ста...
PDF
DNV. Введение в PED 97/23/EC.
PDF
Fortalecimiento y desarrollo rural integral de los Afrocolombianos: el caso d...
PPT
Cloud Computing and Records Management
PDF
Hướng dẫn lập trình quản lý c#
PPTX
Responsive Design & Accessibility
PDF
09.02.2012 Mongolian economic outlook, Dr. D. Khashchuluun
IEC(МЭК). Разработка стандартов.
The World This Week - 18th - 22nd April, 2016
The World This Week - 14th to 18th March, 2016
01 tec ufro
vanderLaan
Sales Enablement Strategies
Carol reid resume_medical
[FR] Cercle Premier RSE : COP 21, comment le digital peut aider ? #CercleRSE
Conceptualizacion de la Planificacion. monicaparra
Escuela superior politécnica de chimborazo
ResumeofJosephAmato.docx
PgM ITTOs
Mark Perriam Profile
ASTM. Вступление страны в ВТО с точки зрения организации, разрабатывающей ста...
DNV. Введение в PED 97/23/EC.
Fortalecimiento y desarrollo rural integral de los Afrocolombianos: el caso d...
Cloud Computing and Records Management
Hướng dẫn lập trình quản lý c#
Responsive Design & Accessibility
09.02.2012 Mongolian economic outlook, Dr. D. Khashchuluun
Ad

Similar to Webinar on identifying, preventing and securing against the unidentifiable attacks (20)

PDF
Plugging Network Security Holes Using NetFlow
PDF
Dismantling intrusion prevention_systems
PDF
Pt08 19 final1
PDF
Light sec for utilities and critical infrastructure white paper
PDF
Qradar ibm partner_enablement_220212_final
PDF
EastNets Compliance Solutions
PPTX
Fs isac fico and core presentation10222012
PDF
2012 Data Center Security
PDF
טכנולוגיות אבטחת מערכות מידע
PPT
Cio ciso security_strategyv1.1
PDF
Fns Incident Management Powered By En Case
PDF
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
PDF
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
PPTX
CyberSecurity Assignment.pptx
PDF
Stalking the Kill Chain
 
PDF
Regulatory Compliance Financial Institution
PPTX
Cyber Threat Jujitsu 101: Acknowledge. Assess. Avoid. Address.
PPT
RSA 2006 - Visual Security Event Analysis
PPTX
Weaponised Malware & APT Attacks: Protect Against Next-Generation Threats
PPTX
The Perils that PCI brings to Security
Plugging Network Security Holes Using NetFlow
Dismantling intrusion prevention_systems
Pt08 19 final1
Light sec for utilities and critical infrastructure white paper
Qradar ibm partner_enablement_220212_final
EastNets Compliance Solutions
Fs isac fico and core presentation10222012
2012 Data Center Security
טכנולוגיות אבטחת מערכות מידע
Cio ciso security_strategyv1.1
Fns Incident Management Powered By En Case
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
CyberSecurity Assignment.pptx
Stalking the Kill Chain
 
Regulatory Compliance Financial Institution
Cyber Threat Jujitsu 101: Acknowledge. Assess. Avoid. Address.
RSA 2006 - Visual Security Event Analysis
Weaponised Malware & APT Attacks: Protect Against Next-Generation Threats
The Perils that PCI brings to Security

Recently uploaded (20)

PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
cloud_computing_Infrastucture_as_cloud_p
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPT
Teaching material agriculture food technology
PDF
Getting Started with Data Integration: FME Form 101
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Machine Learning_overview_presentation.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
cloud_computing_Infrastucture_as_cloud_p
Programs and apps: productivity, graphics, security and other tools
Diabetes mellitus diagnosis method based random forest with bat algorithm
Teaching material agriculture food technology
Getting Started with Data Integration: FME Form 101
Advanced methodologies resolving dimensionality complications for autism neur...
Network Security Unit 5.pdf for BCA BBA.
Machine Learning_overview_presentation.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
A comparative analysis of optical character recognition models for extracting...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Group 1 Presentation -Planning and Decision Making .pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Building Integrated photovoltaic BIPV_UPV.pdf
Assigned Numbers - 2025 - Bluetooth® Document
TLE Review Electricity (Electricity).pptx
Unlocking AI with Model Context Protocol (MCP)

Webinar on identifying, preventing and securing against the unidentifiable attacks

  • 1. Identify, prevent and secure against the unidentifiable attacks Presented by: Dr Steven Turner, VP of Optimisation, Intergence Alan Cottom, CISSP, Solutions Architect, Stonesoft
  • 2. Optimising your connected world. Thank you for joining our webinar • Please note • During this webinar, we will be using Audio Broadcast. The small box in the right hand corner will need to remain open throughout • To chat to the host • click on the speech bubble in the top right hand corner, then type in the text box • To submit a question • click on the question mark in the top right hand corner and open the Q&A box • Experiencing technical difficulties? • please email news@intergence.com or speak to us directly through the chat bar
  • 3. Optimising your connected world. Agenda The webinar has three parts Alan Cottom; Advanced Evasion Techniques; are you protected? Steve Turner; Hyperglance live demo Q&A section
  • 4. Advanced Evasion Techniques (AET) Are you protected? Alan Cottom – Solutions Architect, Stonesoft
  • 5. Physical & Virtual Security Appliances
  • 6. Evasion (definition) Evasion techniques are a means to disguise and/or modify cyber attacks to avoid detection and blocking by information security systems. Evasions enable advanced and hostile cyber criminals to deliver any malicious content, exploit or attack to a vulnerable system without detection, that would normally be detected and stopped. Security systems are rendered ineffective against such evasion techniques. (In the same way a stealth fighter can attack without detection by radar and other defensive systems)
  • 7. Evasion timeline • First papers appeared detailing attacks against or ways to bypass network intrusion detection. 1997-98 • Possibility to combine evasions suggested 2004 • 12 (or so) known “traditional” evasion methods • Stonesoft R&D begin research 2007
  • 8. Evasion timeline • Stonesoft share findings on new evasion threat • Stonesoft deliver 23 STACKABLE AETs to CERT 2010 • February – Stonesoft deliver 124 new AETs • October – Stonesoft deliver further 160 new AETs 2011 • Approx. 2^300 Advanced Evasion Techniques Today
  • 9. Advanced Evasion Techniques (AET) What are they? Any technique used to implement network based attacks in order to evade and bypass security detection What makes them advanced? Combination of evasions working simultaneously on multiple protocol layers Combination of evasions that can change during the attack Carefully designed to evade inspection Typically, AETs are used as part of Advanced Persistent Threats (APT) APT = Motivation – i.e. we want to target you or your organisation AET = Method – i.e. the way in which we will attempt to gain entry
  • 10. Surely my current IPS/IDS/NGFW can stop them? Stonesoft have run tests against all of the highest ranked security devices from the Gartner Magic Quadrant It is possible to effortlessly evade most market-leading security solutions by using one or more advanced evasion techniques (AETs). All products are running the latest versions and updates. StoneGate products were originally vulnerable but now include comprehensive protection against AETs as standard.
  • 11. AETs in action AET Test Environment Untrusted Network Security Device(s) Protected Network [Exploit with AETs] Predator Target [AET Attack] [Vulnerable] Tool Host Gartner Magic Quadrant IPS/IDS/NGFW Solutions
  • 12. AETs in action… AET Demonstration
  • 13. Protection Against AETs Multi-layer Traffic Normalization • StoneGate IPS decodes and normalizes traffic for inspection on all protocol layers. • Fingerprints detect exploits in the normalized data stream. Dynamic Protection • StoneGate IPS software upgrades update the Layered Normalization on all protocol layers. • When new Anti-Evasion updates are available, the StoneGate Management Center can upgrade IPS engines remotely.
  • 14. Vertical Inspection of the data traffic Packet, segment or pseudo -packet based inspection process Maximum Inspection Space Data Traffic Application Protocol layers 3 (Streams) 2 TCP level Segments, pseudo packets 1 IP level Packets Limited Protocol Partial or No Evasion Removal Detect and Block Exploits 1 decoding and inspection 2 Majority of the traffic is left without 3 Unreliable or impossible exploit detection capability to gain speed. evasion removal and inspected with when evasion are not removed on all layers. limited context information available.
  • 15. Horizontal Data stream based, full Stack normalization and inspection process Data Traffic …Continuous Inspection Space… Application Protocol level (Streams) 1 2 3 4 TCP level Segments, 1 pseudo packets IP level Packets 1 Normalize traffic on all Advanced Evasion Detect exploits from the fully Alert and report 4 Evasion attacks 1 protocol layers as a 2 removal process makes the 3 evasion free data stream. continious process. traffic evasion free and through management exploits detectable. system
  • 16. Stonesoft AET Differentiators Stonesoft FW / IPS Description Full-stack visibility Stonesoft decodes and normalizes traffic on all protocol layers Normalization based evasion removal Normalization process remove the evasions before the data stream inspection Horizontal data stream-based inspection Vulnerability based fingerprints detect exploits in the normalized data stream Inhouse evasion research and tools Evasion-proof product quality assured with automated evasion fuzzing tests (PREDATOR) Built-in evasion recognition and logging Anomaly and evasion information included into threat context Dynamic updates & upgrades Antievasion technology automatically updated to Next- Generation IPS and Firewall engines
  • 17. AERT - Advanced Evasion Readiness Test
  • 18. AETs - Comment “Advanced Evasion “If the network security “Recent research indicates Techniques can evade system misses any type of that Advanced Evasion many network security evasion it means a hacker Techniques are real and systems. We were able to can use an entire class of credible – not to mention validate Stonesoft’s exploits to circumvent growing –a growing threat research and believe that security products, against the network security these Advanced Evasion rendering them virtually infrastructure that protects Techniques can result in useless. Advanced Evasion governments, commerce and lost corporate assets with Techniques increase the information-sharing potentially serious potential of evasion success worldwide. Network security consequences for breached against the IPS, which vendors need to devote the organizations.” creates a serious concern research and resources to for today’s networks.” finding a solution.“ – Jack Walsh, Program Manager – Rick Moy, President – Bob Walder, Research Director
  • 20. Optimising your connected world. DEMONSTRATION
  • 21. Optimising your connected world. Q&A Any Questions?
  • 22. Optimising your connected world. Thank You for attending! If you require more information or would like to book a one to one demo : contact us at +44 (0)845 226 4167 or drop us an email at contact@intergence.com Or come along to our Executive Seminars across the UK! Visit our website for more information!

Editor's Notes

  • #2: Thank you very much ladies and gentlemen for joining us today. My name is Robert Smith from Intergence Systems and I am delighted to welcome Stace Hipperson from Real-Status, who will present later in the Webinar. Hyperglancever 1.3 is the subject our webinar today.<click>
  • #3: Just some housekeeping to start with:During this webinar, we will be using Audio Broadcast. The small box in the right hand corner will need to remain open throughoutTo chat to the hostclick on the speech bubble in the top right hand corner, then type in the text boxTo submit a questionclick on the question mark in the top right hand corner and open the Q&A boxIf you are Experiencing technical difficultiesplease email news@intergence.com or speak to us directly through the chat bar<click>
  • #4: <click>We have a simple agenda today. It is split up in to 3 parts<click>I will be presenting a brief background on Intergence and some background on why Hyperglance was created<click>I will then hand over to Stace Hipperson who will be demonstrating ver 1.3 of Hyperglance<click>And finally there will be an interactive question and answer section<click>
  • #15: Application Protocol layers (http, SMB, Netbios etc.)
  • #16: IPSMBIt is possible to segment SMB write data (e.g. MSRPC) into arbitrary sized segments. It is also possible to multiplex SMB writes to different named pipes or files within a single TCP connection.Stonesoftapproach:SMB protocol decoding and validation performedMSRPCMSRPC support both little and big endian encoding of data. Little endian is normally used but implementations accept also big endian, which can be used as evasion in some cases. Stonesoftapproach:Fragmented RPC messages can be used as an obfuscation method to hide attacks. Stonesoft IPS defragments fragmented MSRPC requests. To apply the right fingerprints, Stonesoft IPS follows the protocol execution and provides the fingerprinting system the necessary service information (object UUID, opnum field, endianness) in addition to the request payload data. It also explicitly follows some evasion techniques, like changing the endiannessin the middle of a connection.
  • #21: I would now like to pass you over to Stace Hipperson, CTO of Real-Status
  • #23: <click>