首页> 外文会议>Association for Computing Machinery(ACM) Annual Symposium on Applied Computing(SAC 2004) vol.1; 20040314-17; Nicosia(CY) >The Loop Fallacy and Serialization in Tracing Intrusion Connections through Stepping Stones
【24h】

The Loop Fallacy and Serialization in Tracing Intrusion Connections through Stepping Stones

机译:通过踏脚石追踪入侵连接中的循环谬误和序列化

获取原文
获取原文并翻译 | 示例

摘要

Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate "stepping stones" to conceal their identity and origin. To identify attackers behind stepping stones, it is necessary to be able to trace through the stepping stones and construct the correct intrusion connection chain. A complete solution to the problem of tracing stepping stones consists of two complementary parts. First, the set of correlated connections that belongs to the same intrusion connection chain has to be identified; second, those correlated connections need to be serialized in order to construct the accurate and complete intrusion connection chain. Existing approaches to the tracing problem of intrusion connections through stepping stones have focused on identifying the set of correlated connections that belong to the same connection chain and have overlooked the serialization of those correlated connections. In this paper, we use set theoretic approach to analyze the theoretical limits of the correlation-only approach and demonstrate the gap between the perfect correlation-only approach and the perfect solution to the tracing problem of stepping stones. In particular, we identify the serialization problem and the loop fallacy in tracing connections through stepping stones. We formally demonstrate that even with perfect correlation solution, which gives us all and only those connections that belong to the same connection chain, it is still not adequate to serialize the correlated connections in order to construct the complete intrusion path deterministically. We further show that correlated connections, even with loops, could be serialized deterministically without synchronized clock. We present an efficient intrusion path construction method based on adjacent correlated connection pairs.
机译:基于网络的入侵者很少直接从自己的主机发起攻击,而是通过中间的“垫脚石”进行攻击,以掩盖其身份和起源。为了识别垫脚石后面的攻击者,必须能够追踪垫脚石并构建正确的入侵连接链。跟踪踏脚石问题的完整解决方案包括两个互补部分。首先,必须确定属于同一入侵连接链的一组相关连接;第二,需要对那些相关的连接进行序列化,以构建准确而完整的入侵连接链。解决通过踏脚石进行入侵连接的跟踪问题的现有方法集中于标识属于同一连接链的一组相关连接,而忽略了这些相关连接的序列化。在本文中,我们使用集理论方法来分析仅相关方法的理论极限,并证明完美仅相关方法与垫脚石跟踪问题的完美解决方案之间的差距。特别是,在通过垫脚石跟踪连接时,我们确定了序列化问题和循环谬误。我们正式证明,即使使用完美的相关性解决方案(仅提供给我们所有属于同一连接链的那些连接),序列化相关连接以确定性地构造完整的入侵路径仍然不够。我们进一步证明,即使没有循环,相关连接也可以确定性地序列化,而无需同步时钟。我们提出了一种基于相邻相关连接对的有效入侵路径构造方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号