Defence against advanced, obfuscated and evasion attacks

Defence against advanced, obfuscated and evasion attacks

This module examines in detail the techniques used to carry out evasive attacks, i.e., attacks designed to bypass defense systems. It presents code obfuscation techniques that make static and dynamic analysis more difficult, as well as evasion techniques used to distract or bypass dynamic analysis systems.

Would you like to attend the course live with the instructor?

 

Topics

An overview of the main attack detection techniques, based on signatures and statistical analysis. Analysis of the weaknesses in defensive approaches. Techniques for obfuscating software and network traffic. The effects of obfuscation on the detection of cyber-attacks. Sophisticated attacks designed to circumvent threat detection systems based on network traffic analysis or process monitoring. Advanced defence techniques for detecting obfuscated and evasive attacks. Advanced defence techniques for detecting sophisticated attacks. Machine and deep learning to detect cyber-attacks.

Target

  • Companies offering IT systems management and security services, security operation centres.
  • Cyber analysts
  • Threat analyst

Course structure

Module 01 - OVERVIEW OF ATTACK DETECTION TECHNIQUES
10 hours

Signature-based approaches:

  • Signature-based detection
  • Practical examples: antivirus software and intrusion detection systems (IDS)

Approaches based on statistical analysis:

  • Detection of anomalies through statistical analysis of data
  • Limits and vulnerabilities of this approach

Analysis of the weaknesses in defensive and system:

  • Known attacks that exploit the limitations of signature-based and anomaly-based models.
Module 2 - TECHNIQUES FOR OBFUSCATING CODE AND NETWORK TRAFFIC
10 hours

Code obfuscation:

  • Static techniques: code transformations designed to make the code less readable (e.g., renaming, control flow obfuscation)
  • Dynamic techniques: self-modifying code, packed executables

Network traffic obfuscation:

  • Cryptography and cryptographic tunnels (VPN, SSH, HTTPS)
  • Payload obfuscation and pattern evasion techniques

The effects of obfuscation on the detection of cyber-attacks:

  • Impacts on static and dynamic analysis
  • Risks associated with traditional detection systems
Module 03 - SOPHISTICATED AND EVASIVE ATTACKS
10 hours

Attacks designed to evade dynamic analysis systems:

  • Anti-debugging and anti-virtualisation techniques
  • Polymorphic and metamorphic malware

Network traffic attacks:

  • Examples of advanced attacks such as masquerading
  • Techniques for evading traffic-based IDSs (e.g., fragmented packets, timing attacks)

Social Engineering:

  • The psychological principles underlying social engineering attacks.
  • Common techniques: phishing, spear-phishing, baiting, pretexting
Module 4 - ADVANCED DEFENCE TECHNIQUES
10 hours

Approaches to tackle obfuscated attacks:

  • Use of de-obfuscation techniques for static and dynamic analysis
  • Detection system based on behaviour profiling

Approaches for sophisticated attacks:

  • Adaptive detection systems: dynamic rule updates
  • Context analysis to mitigate evasive attacks.

 Machine and Deep Learning for Cybersecurity:

  • Models for detecting anomalies in network traffic (e.g., autoencoders, RNNs)
  • Applications of supervised and unsupervised classifiers
  • Training techniques and bias prevention in AI models for safety
WORKSHOP
10 hours

Examples of network traffic obfuscation and software applications.

Social engineering attacks

Machine learning based approaches to detect cyberattacks.

Approaches for sophisticated attacks:

  • Adaptive detection systems: dynamic rule updates
  • Context analysis to mitigate evasive attacks

Machine and Deep Learning for Cybersecurity:

  • Models for detecting anomalies in network traffic (e.g., autoencoders, RNNs)
  • Applications of supervised and unsupervised classifiers
  • Training techniques and bias prevention in AI models for safety
  • Theory application on case studies

Defence against advanced, obfuscated and evasion attacks

Index

Request more information

Fill in all sections of the form and click CONFIRM.

You may also be interested in…