Basically, there are two approaches to network intrusion detection: signature detection, and anomaly detection. The signature detection approach utilizes well-known signatures for network traffic to identify potentially malicious traffic. The anomaly detection approach utilizes a previous history of network traffic to search for patterns that are abnormal, which would indicate an intrusion. How can an attacker disguise his buffer overflow attack signature such that there is a greater probability of his attack going undetected by the IDS?
A.
He can chain NOOP instructions into a NOOP "sled" that advances the processor’s instruction pointer to a random place of choice
B.
He can use polymorphic shellcode ?with a tool such as ADMmutate – to change the signature of his exploit as seen by a network IDS
C.
He can use a dynamic return address to overwrite the correct value in the target machine’s computer memory
D.
He can use a shellcode that will perform a reverse telnet back to his machine