首页> 外文学位 >Securing computer networks: Access control management and attack source identification.
【24h】

Securing computer networks: Access control management and attack source identification.

机译:保护计算机网络安全:访问控制管理和攻击源识别。

获取原文
获取原文并翻译 | 示例

摘要

We study the problem of securing computer networks. We mainly focus on two issues: managing access control lists of multiple firewalls and identifying attack sources. As the number of firewalls increases in computer networks, it is crucial to deploy the firewalls and to build an efficient access control list on each of them. Multiple firewalls cooperate to implement the access control by filtering out unwanted packets. The source address of a packet is a decisive parameter when the filtering is carried out. For example, edge firewalls between the intranet and the Internet may use dynamic filters, which can block packets of suspicious source addresses in order to defeat denial of service attacks. However, wily attackers may play tricks to give false information about their source addresses. Therefore, attack sources should be exactly identified before the filtering is applied. In this dissertation, we propose three novel techniques.;First, we study the problem of placing multiple firewalls in an enterprise network. A firewall's complexity is known to increase with the size of its access control list, i.e. rule set. When designing a security-sensitive network, it is critical to construct the network topology and its routing structure carefully in order to reduce the firewall rule sets, which helps lower the chance of security loopholes and prevent performance bottleneck. We study the problems of how to place the firewalls in a topology during network design and how to construct the routing tables during operation, such that the maximum firewall rule set can be minimized.;Second, we study the problem of identifying attack sources on the Internet. It is crucial to find out attacker's unique address before the corresponding filtering rule is activated at the edge firewalls. On the current Internet, not only is a host free to send packets to any destination address, but also it is free to forge any source address that it does not own. This freedom creates a huge security problem. The victims under attack do not know where the malicious packets are actually from and which sources should be blocked because, with forged source addresses, the malicious packets may appear to come from all over the Internet. We propose a path address scheme to identify attackers even when they use spoofed source addresses. Under this scheme, each path on the Internet is assigned a path address. IP addresses are owned by the end hosts; path addresses are owned by the network, which is beyond the reach of the hosts.;Third, we study the problems of spread estimation and spreader detection. The spread of a source host is the number of distinct destinations that it has sent packets to during a measurement period. A spread estimator is a software/hardware module on a router that inspects the arrival packets and estimates the spread of each source. It has important applications in detecting port scans and DDoS attacks, measuring the infection rate of a worm, assisting resource allocation in a server farm, determining popular web contents for caching, to name a few. We design a new spread estimator that delivers good performance in tight memory space where all existing estimators no longer work.;We also study the problem of detecting spreaders. We call an external source address a spreader if it connects to more than a threshold number of distinct internal destination addresses during a period of time (such as a day). We note that none of the current intrusion detection systems can identify spreaders in real-time if the attacker slows down in sending attack packets. We call such an attacker an invisible spreader. We observe that normal traffic has strong skewness especially in an enterprise (or university campus) network. We propose a new scheme to detect invisible spreaders by exploiting the traffic skewness.
机译:我们研究保护计算机网络的问题。我们主要关注两个问题:管理多个防火墙的访问控制列表和识别攻击源。随着计算机网络中防火墙数量的增加,部署防火墙并在每个防火墙上建立有效的访问控制列表至关重要。多个防火墙合作,通过过滤掉不需要的数据包来实现访问控制。进行过滤时,数据包的源地址是决定性参数。例如,Intranet和Internet之间的边缘防火墙可以使用动态过滤器,该过滤器可以阻止可疑源地址的数据包,以克服拒绝服务攻击。但是,狡猾的攻击者可能会耍花招,以提供有关其源地址的虚假信息。因此,在应用过滤之前,应准确识别攻击源。本文提出了三种新颖的技术。首先,我们研究了在企业网络中放置多个防火墙的问题。众所周知,防火墙的复杂性会随着其访问控制列表(即规则集)的大小而增加。在设计对安全敏感的网络时,至关重要的是仔细构造网络拓扑及其路由结构,以减少防火墙规则集,这有助于降低安全漏洞的机会并防止性能瓶颈。我们研究了在网络设计过程中如何将防火墙放置在拓扑结构中以及如何在操作过程中构造路由表的问题,从而最大程度地减少了防火墙规则集。第二,研究了在网络上识别攻击源的问题。互联网。在边缘防火墙上激活相应的过滤规则之前,找出攻击者的唯一地址至关重要。在当前的Internet上,主机不仅可以自由地将数据包发送到任何目标地址,而且可以自由地伪造它不拥有的任何源地址。这种自由带来了巨大的安全问题。受攻击的受害者不知道恶意数据包的实际来源以及应该阻止哪些来源,因为使用伪造的源地址,恶意数据包可能看起来是来自整个Internet。我们提出了一种路径地址方案,即使攻击者使用了欺骗性的源地址,也可以识别它们。在这种方案下,Internet上的每个路径都被分配了一个路径地址。 IP地址归最终主机所有;路径地址归网络所有,这超出了主机的范围。​​第三,我们研究了扩展估计和扩展器检测问题。源主机的传播是它在测量期间内已向其发送数据包的不同目标的数量。传播估计器是路由器上的软件/硬件模块,用于检查到达数据包并估计每个源的传播。它在检测端口扫描和DDoS攻击,测量蠕虫的感染率,协助服务器场中的资源分配,确定要缓存的流行Web内容等方面具有重要的应用。我们设计了一个新的价差估算器,该估算器在所有现有估算器都不再工作的紧凑内存空间中提供了良好的性能。我们还研究了检测价差器的问题。如果外部源地址在一段时间(例如一天)内连接到阈值数量以上的不同内部目标地址,则称其为扩展器。我们注意到,如果攻击者放慢了发送攻击数据包的速度,当前的入侵检测系统都无法实时识别传播者。我们称这种攻击者为无形的传播者。我们观察到正常流量具有严重的偏斜,尤其是在企业(或大学校园)网络中。我们提出了一种通过利用流量偏斜来检测隐形吊具的新方案。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号