首页> 外文会议>ACM conference on Computer and communications security >Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
【24h】

Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays

机译:通过处理数据包间的延迟,通过踏脚石对加密攻击流量进行强大的关联

获取原文

摘要

Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate "stepping stones" to conceal their identity and origin. To identify attackers behind stepping stones, it is necessary to be able to correlate connections through stepping stones, even if those connections are encrypted or perturbed by the intruder to prevent traceability.The timing-based approach is the most capable and promising current method for correlating encrypted connections. However, previous timing-based approaches are vulnerable to packet timing perturbations introduced by the attacker at stepping stones. In this paper, we propose a novel watermark-based correlation scheme that is designed specifically to be robust against timing perturbations. The watermark is introduced by slightly adjusting the timing of selected packets of the flow. By utilizing redundancy techniques, we have developed a robust watermark correlation framework that reveals a rather surprising resulton the inherent limits of independent and identically distributed (iid) random timing perturbations over sufficiently long flows. We also identify the tradeoffs between timing perturbation characteristics and achievable correlation effectiveness. Experiments show that the new method performs significantly better than existing, passive, timing-based correlation in the presence of random packet timing perturbations.
机译:基于网络的入侵者很少直接从自己的主机发起攻击,而是通过中间的“垫脚石”进行攻击,以掩盖其身份和起源。为了识别踏脚石背后的攻击者,即使入侵者加密或干扰了这些连接以防止可追溯性,也必须能够通过踏脚石将连接关联起来。基于计时的方法是当前最有能力且最有前途的关联方法加密的连接。但是,以前的基于计时的方法容易受到攻击者在踏脚石上引入的分组计时扰动的影响。在本文中,我们提出了一种新颖的基于水印的相关方案,该方案专为抵抗时序干扰而设计。通过稍微调整流的选定包的时序来引入水印。通过使用冗余技术,我们已经开发了一个鲁棒的水印相关框架,该框架揭示了足够长的流上独立且均匀分布的(iid)随机定时扰动的固有局限性,这是一个相当令人惊讶的结果。我们还确定了时序扰动特性与可达到的相关有效性之间的权衡。实验表明,在存在随机分组定时扰动的情况下,该新方法的性能明显优于现有的基于定时的被动相关性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号