首页> 外文会议>Advanced Information Networking and Applications Workshops, 2009. WAINA '09 >Manipulation of Network Traffic Traces for Security Evaluation
【24h】

Manipulation of Network Traffic Traces for Security Evaluation

机译:操作网络流量跟踪以进行安全评估

获取原文

摘要

Testing network-based security tools such as intrusion detection and prevention systems (IDS/IPS) differs from testing ordinary network tools (e.g., routers and switches). Basically, in addition to the parameters (such as bandwidth utilization, routing information and packets timing) that are important for network tools, security tools are more sensitive to issues like traffic composition, contents, and session level parameters. Generating a realistic synthetic traffic that keeps all the characteristics of the real traffic has proved to be difficult. For this reason, security testers often use real traffic traces in their test or evaluation. However, the available traces are often limited in number or size. Therefore, it is necessary to merge and manipulate traces to create a test environment that would be representative of the operational environment, and to inject attacks into the traffic. A variety of tools for recording, replaying as well as forging packets can be obtained easily, but there exist very few tools for manipulating traces so as to modify the traffic composition from the networking viewpoint. Among them, surprisingly there is no tool for manipulating traces without destructing their security-relevant characteristics. In this paper, we present a brief survey for trace manipulation and packet forging tools. Then we determine the requirements of tools for manipulating traces and injecting attacks while keeping their original characteristics. Finally, we present the architecture, and the implementation of our tool intended to fill this lack in security testing tools.
机译:测试基于网络的安全工具(例如入侵检测和防御系统(IDS / IPS))与测试常规网络工具(例如路由器和交换机)不同。基本上,除了对网络工具很重要的参数(例如带宽利用率,路由信息和数据包定时)外,安全工具对流量组成,内容和会话级别参数等问题也更加敏感。事实证明,要保持现实交通的所有特征,生成现实的综合交通十分困难。因此,安全测试人员经常在测试或评估中使用真实的流量跟踪。但是,可用迹线通常在数量或大小上受到限制。因此,有必要合并和处理跟踪以创建可以代表操作环境的测试环境,并将攻击注入流量中。可以轻松获得各种用于记录,重放和伪造数据包的工具,但是从网络的角度来看,很少有用于处理跟踪从而修改流量组成的工具。其中,令人惊讶的是,没有不破坏其与安全相关的特征来操纵轨迹的工具。在本文中,我们简要介绍了跟踪操作和数据包伪造工具。然后,我们确定在保持痕迹原始特征的同时对痕迹进行操作和注入攻击的工具的要求。最后,我们介绍了该体系结构以及该工具的实现,以填补安全测试工具中的这种不足。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号