首页> 外文会议>2012 2nd IEEE International Conference on Parallel Distributed and Grid Computing. >Stealth and semi-stealth MITM attacks, detection and defense in IPv4 networks
【24h】

Stealth and semi-stealth MITM attacks, detection and defense in IPv4 networks

机译:IPv4网络中的隐形和半隐形MITM攻击,检测和防御

获取原文
获取原文并翻译 | 示例

摘要

A Man-In-The-Middle(MITM) attack is one of the most well known attack on the computer networks. Out of the several variations of MITM, Address Resolution Protocol(ARP) Spoofing/Poisoning is widely used in packet interception and on-the-fly manipulation. Traditional MITM attacks by ARP Poisoning expose the attacker's identity and thereby physical location. In this paper, to the best of our knowledge it is for the first time that an MITM attack has been added with stealth capabilities. We propose two new attacks namely Stealth MITM(SMITM) and Semi-Stealth MITM(SSMITM) at the Data Link Layer using ARP Spoofing which add stealth capabilities to MITM attacks, thereby concealing the identity of an attacker. Finally, we give a detection and defense technique for the attacks. All the attacks proposed in the paper have been verified and successfully validated in a 300+ node real production network and test beds which include nodes with latest Linux and Windows operating systems under default and secured network scenarios. The results have been 100% effective and have proved the reproducibility of the proposed attacks.
机译:中间人(MITM)攻击是计算机网络上最著名的攻击之一。在MITM的几种变体中,地址解析协议(ARP)欺骗/中毒被广泛地用于数据包侦听和即时操作中。通过ARP中毒进行的传统MITM攻击会暴露攻击者的身份,从而揭示其物理位置。在本文中,就我们所知,这是首次添加具有隐身功能的MITM攻击。我们提出了两种新的攻击,分别是使用ARP欺骗的数据链路层上的隐形MITM(SMITM)和半隐身MITM(SSMITM),它们为MITM攻击增加了隐身功能,从而隐藏了攻击者的身份。最后,我们给出了针对攻击的检测和防御技术。本文中提出的所有攻击均已在300多个节点的实际生产网络和测试平台中进行了验证和成功验证,其中包括在默认和安全网络情况下具有最新Linux和Windows操作系统的节点。结果是100%有效的,并证明了所提出攻击的可重复性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号